The U.S. Department of Defense is looking for a few good hackers to penetrate a facilities network underpinning the Pentagon's basement, mezzanine, and the command and communications center used by the president and the secretary of defense. Defense has hosted white hat hacking sessions since 2016.
What happens when a water management facility –classified as critical infrastructure and essential services– is infiltrated by a foreign threat actor?
This case study dives into an in-depth analysis of the security challenges faced, conditions under which the breach happened, and how the whole situation was...
This report dives deep into the modern endpoint detection and response (EDR) platform that is driven by artificial intelligence/machine learning for security effectiveness.
Download this report and learn more about:
Advanced automated threat detection and response capabilities, with no need for human...
This report shows how IBM Security ReaQta provides complete endpoint threat coverage of sophisticated cyberattacks with virtually no human intervention while producing top-quality alerts.
Download this report to learn about how ReaQta delivered:
100% detection coverage across the cyber kill chain
Black Hat Europe returns to London, offering deep dives into the latest cybersecurity research and trends, including how to build an open, transparent, but also secure internet; harvesting zero-day flaws before attackers; what we can learn from "metaparasitical" scammers who scam scammers; and more.
When it comes to advanced threat response, most financial institutions say their current abilities are average. Only one-third say automation is crucial to how they identify and respond to threats. This ebook is developed from a recent survey & related panel discussion of APAC and ANZ experts who analyze the state of...
When it comes to advanced threat response, most financial institutions say their current abilities are average. Only one-third say automation is crucial to how they identify and respond to threats. This panel of APAC and ANZ experts analyzes the state of security automation in financial services.
The rise in successful ransomware attacks is part of an increasingly challenging threat environment that has affected organizations across all sectors, including state and local government.
In this report 58% of local government organizations were hit by ransomware in 2021, up from 34% in 2020.
This is a 70%...
In 2022, 56% of lower education organizations and 64% of higher education organizations were hit by ransomware in the last year.
This is a considerable increase from the 44% of education respondents that reported an attack in our 2021 survey (based on 499 respondents across lower and higher education).
According to the Australian 2021 OAIC Notifiable Data Breaches report, the healthcare industry alone has been the single most breached sector in Australia, experiencing 19% of all breaches between January to June that year.
Given the sensitivity of the information available with healthcare providers, they are no...
Tributes are being paid to Vitali Kremez, who has died at the age of 34 in a suspected scuba-diving accident. The renowned threat intelligence expert, born in Belarus, had long tracked Russian cybercrime syndicates and was part of an ad hoc group established to counter ransomware and help victims.
According to this report, the tangible returns from investments in MDR include:
90% reduction in time to detect high-risk threats that require investigation;
95% reduction in time to identifying the source of attack and type of threats;
Improved accuracy of detections.
With the increasing volume in...
One of many impactful ways organizations using MDR can benefit is reducing their time to detect and respond from typically 280 days to as little as a few minutes – thereby dramatically reducing the impact of an event.
This Infographic focuses on the top 5 reasons on why MDR should be the top priority for every...
API attacks are up, and lateral movement has become the new battleground. But VMware's latest Global Incident Response Threat Report shows that responders are starting to step up and fight back against attackers. Chad Skipper tells how and shares key findings from this new report.
Jamf plans to buy startup ZecOps to extend its ability to detect and respond to sophisticated threats across Mac, iOS and Android devices. Jamf's proposed acquisition will provide threat hunting tools to determine if any advanced attacks have compromised mobile devices.