About 210 websites of central and state government departments in India were displaying personal details and Aadhaar numbers of beneficiaries. Security experts are questioning why auditors did not detect problems that led to the data leakage and say it's time to take strong action against faulty auditors.
A deep dive into the takedowns of AlphaBay and Hansa, and their impact on the secretive illicit darknet marketplace, leads the latest edition of the ISMG Security Report. Also, a puzzling breach at Ricoh Australia.
Ricoh's Australia office has notified banks, government agencies, universities and many large businesses about a curious data breach that, in some cases, exposed login credentials for its multifunction devices.
Fighting a well-established cyber underground churning out increasingly complex malware requires that defenders change tactics to make it far more difficult for attackers to succeed, says Sajan Paul of Juniper Networks.
Malware attacks are increasing, including ransomware like CryptoLocker, Locky, and zCrypt.
Businesses know it's essential to protect PCs from malicious programs, but many don't realize the value of server-level protection until the damage is done. Server-level protection from viruses and malware is essential, and...
Give the right users access to the right resources at the right times and for the right purposes.
Two-thirds of businesses have experienced data theft or corruption that originated within their organizations. But insider threats are difficult to control because your IBM i users need at least some level of access to...
What trait does a global cyberattack and a hurricane share? Both could cost insurers - and victims - dearly. In a new report, Lloyd's of London estimates that a major cloud services attack could trigger $53 billion in losses and cleanup costs.
Demands by politicians that people must be willing to surrender their privacy rights to help security services battle cybercrime are shorthand for governments having significantly underinvested in the required resources, says information security expert Brian Honan.
A discussion on the latest happenings in the darknet marketplace leads the latest edition of the ISMG Security Report. Also, getting to the bottom of Russia's Democratic Party hack could be the ultimate goal of a lawsuit filed against the Donald Trump presidential campaign.
The Question is WHEN? Here are some sobering facts:
54% of breaches remain undiscovered for months;
60% of an organization's data is stolen within hours of an attack.
So what can you do about it?
Learn how to Control Advanced Malware with More Visibility.
Determined attackers constantly find new methods to outwit traditional security systems, using an arsenal of techniques to attack from every angle. Knowing who is behind the threats you face and what their motivations are can help you implement security measures to put them on the defensive.
Organizations and analysts need the ability to shift threat intelligence from a data feed into actionable results - this is the core of applied threat intelligence (ATI). Organizations need to move their thinking away from viewing data breaches as a onetime event and instead recognize that with every incident they are...
Enterprise Intelligence is an ongoing practice in which organizations analyze disparate data sources to identify the vulnerabilities and threats across the enterprise.
Download this infographic and learn:
How much more likely analytically driven organizations are to respond to security threats;
What percent of...
Banks that cannot evolve their fraud detection capabilities to effectively address two seemingly opposing requirements - building trust through strong cybersecurity programs and delivering a seamless customer experience - will fail to build new market share, and will lose market share to those banks that...
As financial institutions seek to capture new opportunities through online banking, it becomes increasingly critical to both provide a seamless user experience and help protect against online fraud. But fraudsters continue to successfully modify their attack methods to keep pace with this transformation, stealing...