Year after year, cyber threats continue to increase in both sophistication and frequency. These threats often lead to high-profile losses, rampant media commentary and end user uneasiness.
Download this eBook to understand:
Why breaches are occurring;
How to protect your organization from hackers with...
The cloud is changing the way businesses approach enterprise software as it provides an option to outsource the infrastructure and underlying maintenance that accompanies deployments. If organizations can fast forward beyond the process of procuring hardware and facilities, installing and configuring software or...
A flash drive holding sensitive customer data was lost after a routine audit with federal examiners. Now experts are left wondering: How could such an egregious breach happen?
Hackers issued a "terror" threat against movie theaters that show the forthcoming Sony comedy "The Interview," but the U.S. Department of Homeland Security sees "no credible intelligence to indicate an active plot."
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private sector organizations reciprocate and understand the how, what and why of the law enforcement/public body process.
This mutual...
Since the phrase "Advanced Persistent Threat" (APT) was coined nearly ten years ago, it has been the subject of extensive discussion and debate in the IT security community, attracting terabytes-worth of media buzz. The spotlight on APT's has been critical of bringing the reality of today's threats to light, but the...
Although APT's can vary significantly from breach to breach, they generally have many common phases and mechanisms. In this session, we will define and describe the APT attack and defend lifecycle, provide an overview of how the day is structured and what we aim to achieve, answering such questions as:
What is...
What are the most common mechanisms used in the "Exploit" phase? Many attacks simply take advantage of known vulnerabilities or network weaknesses that have not been addressed, in which case the adversaries have no need to create custom malware. When they are employed, "zero-day" attacks are often very difficult to...
The absolute worst time to develop a breach response plan is directly after you have discovered a breach. The absolute best way to have your team fail at responding is to not have them trained with well-practiced procedures and have them be overly reliant on expensive, improperly configured technology. Strike, strike,...
To date, the most common reaction to targeted attacks has been for organizations to just do what they have always been doing, but harder. That isn't going to work. We need to look at this problem differently and adopt a different set of thought processes. There is a great deal to be said for adopting a warlike...
A breach notification letter sent by Sony Pictures Entertainment to its employees offers a conclusive look at the amount of personal information, including healthcare data, taken by hackers following a Nov. 24 "wiper" malware attack.
The sentencing of a former Alabama hospital worker to two years in prison for his role in an ID theft incident that resulted in tax refund fraud, and a related class action lawsuit, illustrate that insider threats are a major ongoing challenge, two privacy experts say.
Did you know 59% of people fail to store their passwords securely?
With users connecting to unsecured public networks and running multiple applications from both company and personal devices, sensitive corporate data is more vulnerable than ever before. For your security policies to be effective, they need to bring...
A staggering 1/3 of businesses have experienced lost or stolen staff mobile devices and, of those, 1/4 have lost data as a result.
With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints...
Virtualization promises cost savings, improved productivity, and the ability to transform your business. But too often security can either detract from the performance gains that virtualization promises, or just not give you the protection you need. Getting the balance right is critical.
Download "Security for...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.