What’s worse than a massive data breach? A massive data breach followed by a shareholder derivative lawsuit. Learn what’s at stake and what CISOs can do to mitigate the damage.
CISOs have been lightly tapping on the boardroom door for years but now have a reason to confidently take a seat at the table. Why?
Machine learning and artificial intelligence are helping threat-intelligence firms cover a greater area of the darknet, but human analysts will always be necessary, experts say. Threat intelligence firms are racing to expand their machine-learning capabilities to capture more of the un-indexed parts of the internet, but somewhat ironically, human analysts and experts remain critical to
Deep Instinct analysts test three code injection methods and a custom-built Mach-O loader to load malicious files from memory. Malware authors often use code injection to hide activity and bypass security defenses. There are several ways to implement code injection techniques, which run malicious code through unsuspected or legitimate system processes. Malware writes part of
Containerization continues to gain popularity with many large enterprises, where thousands of new containers can be deployed every day. Containerization provides the benefits of cloud computing, like infinite expandability, but also individual control over each independent container, which can act as anything from tiny microservices to full-blown programs and operating systems. Yet, despite these advantages,
Tech executives have had a place at the top of the org chart since the advent of the CIO title in the 1980s and ’90s. And tech security has become a more and more overriding concern for top executives, more recent additions to the C-suite have come in the form of Chief Security Officers (CSOs)
Organizations impacted by breach, which gave attackers illegal access to a database containing sensitive account information, need to check their container images. The owners of some 190,000 Docker accounts will need to change their passwords and verify their container images haven’t been tampered with as the result of a recent intrusion into a Docker Hub
A flaw in the software used to remotely access cameras and monitoring devices could allow hackers to easily take control of millions of pieces of the IoT. Software intended to help homeowners be more secure may deliver their security devices into the hands of hackers. That’s the conclusion of research conducted into a variety of
Financial services firms saw upticks in credential leaks and credit card compromise as cybercriminals go where the money is. More than one-quarter of all malware attacks target the financial services sector, which has seen dramatic spikes in credential theft, compromised credit cards, and malicious mobile apps as cybercriminals seek new ways to generate illicit profits.
A database with no login required has been found to contain names, addresses, age, and more for over 80 million U.S. households. An unprotected database with information that could affect up to 65% of US households has been found by researchers Noam Rotem and Ran Locar, and this time the exposed data is focused on
A people-centric approach to managing cyber security vulnerability, attacks and privilege Download Your Copy We respect your privacy, by submitting this form you agree to having your details passed onto the sponsor who may promote similar products and services related to your area of interest. For further information on how we process and monitor your