We Need More Than Employee Training Against Phishing

Emails have long been the customary approach for delivering phishing scams, which have affected more than one-third of all organizations. However, as most organizations move toward improving their security, attackers are developing other methods that use more than just email. Atif Mushtaq, founder of SlashNext, explains the newer, short-lived tactics that are being used to target human weaknesses and exploit employee vulnerabilities.

Five Possible Ways You Did Not See That Data Breach Coming

Organizations are often not fully aware of the security processes of the companies they outsource to, but they are still held responsible in the case of a data breach. Ilia Sotnikov, VP of Product Management at Netwrix, explains why every company should take a risk-based approach when developing relationships with contractors and avoid making these five mistakes that could lead to a data breach.

A Short History Of Computer Viruses

The evolution of malware (kicked off in 1986 with the Brain virus) spawned a plethora of Trojans, worms and ransomware. David Balaban, computer security researcher with over 15 years of experience in malware analysis and antivirus software evaluation, looks back on the top 10 computer viruses that turned out to be groundbreaking or caused hefty damage.

Innovation Leads to a New Frontier of Identity Management

With the exposure of personally identifiable information via data breaches, organizations need to look beyond name, address, date of birth and Social Security Number to accurately identify individuals. Advanced data and innovative technology, such as physical and behavioral biometrics, device intelligence and digital behaviors, can help usher in a new frontier of authentication and lead to improved identity proofing as well as a better customer experience.

9 Ways I’ve Seen Companies Respond to a Breach

Breaches aren’t easy to deal with, especially if you are of the opinion that companies are people, too. Having seen, been part of, and lent a shoulder to many a breach, Javvad Malik, Security Advocate at AlienVault, offers nine of the common (but not best!) ways that companies respond to breaches.

Don’t Let Data Privacy Day Come and Go

January 28 of every year is Data Privacy Day, where companies around the globe gear up for educating their employees on the importance of privacy and security. Jodie Daniels, Founder of Red Clover Advisors, suggests that we consider extending the knowledge and importance generated on this day into the other 364 days of the year.

What SOCs Can Learn from the Industrial Revolution

With hundreds, if not thousands of security alerts per day pouring into Security Operations Centers (SOC), security professionals are fighting a losing battle. Fortunately, tried-and-true manufacturing techniques can turn the tide. Heather Hixon of DFLabs outlines two techniques that can help even the playing field between SOCs and their adversaries.

Local Governments, Ransomware, And The Public Risk

Local governments and small businesses are frequently being targeted by ransomware attacks. What makes these entities prime targets for malware and how can they avoid being an easy target? Cohesity CTO Steve Grewal suggests what government officials and business owners can do to avoid having their operations halted.

Cyber Hygiene and Digital Resilience to Withstand a Cyber Attack

In the past, nation states such as North Korea and China had a very limited ability to respond to the U.S.’ military attacks or sanctions. But in today’s digital world, these countries use cyber-attacks to deter a sanction or get retribution. Wayne Lloyd, Federal CTO of RedSeal, provides a list of actions organizations can take to ensure good cyber hygiene and digital resilience to withstand a cyber event and/or recover quickly.

Can SMBs Do Something to Prevent Ransomware? (Yes!) - Part 2

Last year Locky, NotPetya and WannaCry ransomware savaged Internet users, with billions of dollars lost, data destroyed, worldwide shipping disrupted, and reputations damaged. Even though they are the most hacked businesses on the Internet, many SMBs do not have proper cybersecurity protections in place. In part 2 of this two-part series, Dave Moore, founder of Internet Safety Group, walks the reader through a well-crafted response plan and reviews of the top backup programs.

Can SMBs Do Something to Prevent Ransomware? (Yes!) - Part 1

Last year Locky, NotPetya and WannaCry ransomware savaged Internet users, with billions of dollars lost, data destroyed, worldwide shipping disrupted, and reputations damaged. Even though they are the most hacked businesses on the Internet, many SMBs do not have proper cybersecurity protections in place. In part 1 of this two-part series, Dave Moore, founder of Internet Safety Group, explains why and how SMBs need to make Internet safety training a top priority.

Learn About Cryptomining – The Latest Most Popular Cyberattack

Criminal cryptomining has replaced ransomware as the leading type of cyber attack in 2018. While not all cryptomining is criminal in nature, this new type of cyber attack has gained momentum and popularity as a result of its success. Lastline’s director of threat intelligence, Andy Norton, explains the popular criminal techniques used to mine cryptocurrencies — and what lies ahead for cryptomining.

We’re All in This Together – Why You Should Champion National Cyber Security Awareness Month

With data breaches on the rise and personal information ending up in the hands of cyber criminals, we are no longer questioning whether a breach will occur, but when the breach will occur. Marija Atanasova, Sr. Content Strategist for the IT Security community at BrightTALK, interviewed Karen Creasey of NCSAM to learn how to get the most out of National Cyber Security Awareness Month (October).

Let’s Pretend You've Been Breached. Now What?

Every business falls victim to cyberattacks sooner or later. Are you prepared for when the inevitable breach happens? If not, your business and your career could be in jeopardy. This article highlights nine key criteria that should be part of every cyber-breach preparation plan.

Legalized Sports Betting, Player Experience And Fraud Prevention

As new players are welcomed into the sports betting ring with the recent law changes, fraudsters will attempt to take advantage. New entrants to the online sports betting world in the U.S. must come to terms with a core challenge facing nearly every digital business: how to ensure an exceptional user experience while also preventing fraudulent activity.

The Rise And Fall Of Ransomware And Malicious Miners

According to a new report from Kaspersky Lab, in only a year's time, the number of Internet users who have fallen victim to ransomware or malicious crypto miners has skyrocketed from 1.87 million (2016) to 2.7 million (2017). InfoSec and cybersecurity writer Kacy Zurkus gives us a brief journey of the rise and fall of ransomware and malicious miners.

It Is Time To Upgrade The Cybersecurity Tools Businesses Use

How can companies be better at training employees to prevent phishing and improve security? Inky founder Dave Baggett provides a quick history of antivirus software, how antivirus worked then and now, and the flaws in security software.

Spotting The Breach: What Are The Indicators Of Compromise?

What are the signs of a breach? Are you catching them all or do you have a false sense of security (yes, pun intended) when it comes to all things cyber within your organization? Sean Martin reaches out to the community of experts to help him identify some ways to spot the signs of a breach that might not be immediately evident.

The Digital Crime Wave That’s Thriving Under the Radar

Attackers have shown their cards and the mid-market represents an extremely valuable alternative to the well-defended enterprise. Coronet founder and CISO Dror Liwer reviews the threat landscape and explains why it’s time for the mid-market to take cybersecurity as seriously as the enterprise, even as financial and operational constraints remain.

It’s Time To Raise Our Game On Insider Threats

The power of the digital workplace comes with an exponential increase in human interaction, as well as an inherent catalyst for risk creation. As collaboration platforms continue to gain traction, the concern for insider threats grows. Greg Moran, Chief Operating Officer at Wiretap, offers his perspective and insight on Wiretap’s just-released Human Behavior Risk Analysis Report.