The latest edition of the ISMG Security Report offers an analysis of the phases businesses will go through in the recovery from the COVID-19 pandemic, plus an assessment of new risks resulting from the work-at-home shift and lessons learned from the Equifax breach.
Supermarket giant Morrisons is not liable for a data breach caused by a rogue employee, Britain's Supreme Court has ruled, bringing to a close the long-running case - the first in the country to have been filed by data breach victims.
Hotel giant Marriott, which in 2018 disclosed that it had suffered one of the worst data breaches in history, is now warning that it suffered a new breach earlier this year that exposed personal details - although not payment card information - for 5.2 million customers.
Traditionally, security teams look to penetration tests and red teaming to test and build confidence in their security programs. These options are often costly, time-consuming, and limited in scope. There is a better way to gain confidence in security models: continuous attack simulations, which automate adversary...
The European Network of Transmission System Operators, which represents over 40 electricity transmission operators throughout the continent, revealed this week that hackers penetrated its IT network. Security experts say this incident is another wake-up call for the industry.
The attack surface is constantly expanding, with threats continuing to keep pace with the evolution in infrastructure and digital transformation, says Leah MacMillan, chief marketing officer of Trend Micro.
Security firm Emsisoft is offering free, customized decryptors to victims of PwndLocker ransomware, which first surfaced in late 2019 and has been tied to attacks against Lasalle County in Illinois and the Serbian city of Novi Sad, with the gang demanding up to $660,000 or more in bitcoins from its victims.
The security skills shortage has been well documented over the years. It remains a salient problem for most enterprises as 66% of respondents to a 451 Research 2019 survey still say they do not have enough information security personnel on staff, and 33% specifically cited pen-testing skills as not meeting their...
When it comes to the cyberattacks, very few are as scary as the Advanced Persistent
Threats (APTs). The National Institute to Standards and
Technology (NIST) defines it as "a long-term pattern of
targeted, sophisticated attacks."
Threat actors are using more sophisticated attack methods which may go undetected...
Testing the cybersecurity posture of an organization or its
cybersecurity resilience to cyberattacks, has come a long
way. The demand for the latest and most comprehensive
testing solutions continues to grow to counter
the ever-increasing wave of cybercrime. Until
recently, the information security...
Australia reportedly took a sensitive military recruiting database offline for 10 days in February following concerns it may have been compromised. The Defense Department says there's no evidence data was stolen.
At the core of cybersecurity, every leader has just one ultimate question: 'Have we been compromised?" And yet that remains the most difficult question to answer with certainty, says Ricardo Villadiego, CEO of Lumu Technologies.