[ad_1] Unintended consequences and risks need board-level attention and action. Even the best inventions and intentions can result in unintended consequences. Email vastly improved many forms of communication and information sharing — but it also begat spam, phishing, and an entire industry in cybersecurity. Social media connected billions of people and spread democratic ideals —
[ad_1] In the world of cybersecurity, many companies that provide protection have moved away from preventing attacks to remediating them after they land. One reason for this is how difficult prevention has become, with new attacks like memory exploits and fileless malware finding vulnerabilities and getting around traditional protection. It’s easier from a defender’s standpoint
[ad_1] APT3 quietly monitored an NSA attack on its systems and used the information to build a weapon of its own. Chinese threat actor APT3 quietly monitored the US National Security Agency’s use of a highly sophisticated cyber attack tool and then reverse engineered the code to build an advanced Trojan of its own called
[ad_1] From sushi and phishing to robots, passwords and ninjas — and the winners are … Mike Epplin (mepplin), Tampa, Fla., earns the top honors and a $25 Amazon gift card for his apt APT-related caption, inked below by cartoonist John Klossner. When not writing cartoon captions, Epplin’s day job is presales engineer at Respond Software.
[ad_1] Preventative technologies are only part of the picture and often come at the expense of the humans behind them. Companies spend millions on security technology designed to prevent cyberattacks, yet they are still plagued by costly breaches and network intrusions. Indeed, the number of attacks are on the rise, taking longer to address than
[ad_1] In 2019, there will be no end in sight to email-driven cybercrime such as business email compromise, spearphishing, and ransomware. The year 2018 was another record-breaking year for cyberattacks, and organizations should expect more of the same in 2019. Attackers, who continue to prioritize email as the primary attack vector, are increasingly deploying more