Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar...
The latest edition of the ISMG Security Report features an update on what U.S. intelligence chiefs told Congress this week about persistent nation-state cyberthreats, plus reports on evasion tactics used by cryptocurrency money launderers and what government CIOs have to say about security funding.
Most companies have huge gaps in their cyber defenses, and can be compromised at will by a determined hacker. The industry even has a term for it: Assume Breach.
Join Roger A. Grimes, a 30-year computer consultant, for this webinar where he explores the latest research on what's wrong with current defenses and how...
In a case of business email compromise, Chinese hackers stole $18.6 million from the Indian arm of Tecnimont SpA, an Italian engineering company, through an elaborate cyber fraud scheme that included impersonating the firm's chief executive.
Phishing attacks have seen a meteoric rise in the last year as attackers continue to refine their tactics and share successful attack types. In particular, they've taken advantage of the malware-as-a-service offerings on the dark web in order to increase the efficiency and volume of attacks.
Download this white...
No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.
Join Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4, as...
Don't fear free tools and practices if they can help your organization better block phishing attacks, improve information security posture and help safeguard others, too, says Andy Bates of the Global Cyber Alliance.
The U.K.'s National Cyber Security Center incident response teams have investigated more than 1,000 significant incidents in the past two years, the majority of which trace to nation-state attackers, officials say.
Email fraud threats have evolved from attackers targeting networks to them focusing on specific individuals within an organization. What can enterprises do to halt these attacks before they reach the inbox? Denis Ryan of Proofpoint shares defensive tactics.
Those of you who are CISOs and have been conducting awareness programs for years realize that ''the devil is in the details" when building a successful program. Initial attempts to get an awareness program started are usually done by trial and error- but this hit-and-miss approach is often ineffective or frustrating....
This white paper discusses the optimal method of enabling security for Office 365 so as to maximize protection against the growing array of security threats that organizations will encounter, while minimizing the total cost of ownership.
Download and read this white paper and you will learn:
How moving to the...
Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery.
Download this white paper and learn:
Why the risks of relying solely on Office 365 are...
Advanced attacks such as business email compromise and account takeover-based attacks continue to be a leading way attackers are bypassing Secure Email Gateways (Exchange Online Protection included). Unfortunately, the majority of such attacks target Office 365 organizations.
To stop these attacks a new model...
The 2018 State of the Phish Report presents analysis of data that can help CISO's and their teams identify opportunities to manage end-user risk. The report delivers the types of data infosec professionals are seeking as they develop their own security awareness training programs.
Download this report to learn more...
Spear phishing attacks are in the news again following the Justice Department's indictment of Russian military intelligence officers for alleged attacks against U.S. politicians and county and state election boards. Here's how to play better phishing defense.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.