This Valentine's Day, authorities are once again warning individuals to watch out for anyone perpetrating romance scams. The FTC says Americans lost $143 million to romance scams in 2017, while in the U.K., Action Fraud says reported romance scam losses in 2018 topped $64 million.
The 2019 RSA Conference offers an opportunity to learn about new concepts across all aspects of cybersecurity. One such area is "data gravity," which will be the topic of a session featuring Microsoft's Diana Kelley and Sian John. They discuss the concept in a joint interview.
What if organizations' information security practices have gotten so good that they're finally repelling cybercriminals and nation-state attackers alike? Unfortunately, the five biggest corporate breaches of the past five years - including Yahoo, Marriott and Equifax - suggest otherwise.
Fifty-four percent of survey respondents say their institutions' digital authentication measures are average or below when compared to their peers. And 55 percent rate themselves at average or below when it comes to their institution's current ability to apply the right amount of security to the right transactions at...
Many healthcare organizations are falling short in their incident response plans, says Mark Dill, principal consultant at tw-Security. The former director of information security at the Cleveland Clinic discusses best practices for keeping those programs current in an interview at the HIMSS19 conference.
The evolution of the threat landscape has dramatically increased the size of the security team's technology stack. However, a large and complex security stack with low integration and too many point products will decrease system performance and create headaches for your understaffed security team.
In response,...
The Trump administration is leading a broadside against Chinese telecommunications giants Huawei and ZTE. But concerns that Chinese networking gear could be used as backdoors for facilitating state-sponsored surveillance or disrupting critical infrastructure are not limited to America.
Cryptocurrency exchanges are seeing fraudsters submit doctored photos in an attempt to reset two-step verification on accounts. The ruse appears to have some degree of success, underscoring the difficulties around verifying identity on the internet.
Hackers have breached the Australian Parliament's network, although investigators say they have found no evidence that attackers stole any data. But Parliament's presiding officers said all users have been ordered to reset their passwords as a precaution.
Whether you have a security team of two or 100, your goals are to ensure the business thrives. And that means protecting
critical systems, users, and data, detecting and responding to threats, and staying ahead of cybercrime. But there are a number of serious challenges plaguing today's SOC that may impede your...
IT security teams have to protect their organizations from cyber attackers while also addressing internal and regulatory compliance requirements, such as ISO 27001, PCI DSS or GDPR. This is no small task. If you're relying on a basic log manager or rudimentary spreadsheets to store and search through logs, chances...
Security and risk management leaders increasingly seek SIEM solutions with capabilities that support early targeted attack detection and response. Users must balance advanced SIEM capabilities with the resources needed to run and tune the solution.
Gartner named IBM a Leader in the 2018 Gartner Magic Quadrant for...
Organizations globally realize that working only to prevent and detect cyber attacks will not protect them against cyber
security threats. That is why IBM Resilient was developed to arm security teams with a platform for managing, coordinating and streamlining incident response (IR) processes.
Download this white...
Security teams are leveraging incident response (IR) orchestration to face these growing threats because it empowers
analysts to make intelligent decisions and act quickly. Advanced incident response orchestration coordinates people, process and technology both within the Security Operations Center (SOC) and across...
A SOC provides centralized and consolidated cybersecurity incident prevention, security event monitoring, detection and response capabilities, and supports other business unit requirements. This research helps security and risk management leaders identify the best SOC model for their organization.
Download the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.