Decentralized threat intel sharing, more public-private collaboration, and greater use of automated incident response are what’s needed to combat phishing As organizations begin to plan their cybersecurity strategy for 2020 and beyond, email security will certainly be high on leadership’s agenda. That’s because phishing attacks continue to increase in sophistication and frequency, and email remains
Cyber Attackers Shift Strategy Away From Enterprise Perimeter And Endpoints To Target Employees The cyber security threat landscape in EMEA is shifting away from the enterprise perimeter and endpoints to target employees. The new anatomy of a hack includes social networks, news, and corporate websites. Hear how enterprises can protect personnel from these targeted attacks.
The average dwell time for riskware can be as much as 869 days. Dwell time — the amount of time a threat spends inside of a network before an organization discovers and removes it — has become a significant problem for small and midsize businesses (SMBs), according to a report released today by Infocyte. The
A new report says that phishing and man-in-the-middle attacks are major risks to financial institutions – via mobile devices in the hands of their employees. Financial services is a highly regulated industry, but that doesn’t mean it’s immune to cybersecurity woes. According to a new report, financial services organizations experience higher rates of phishing and
Because data has never been more portable, taking it has never been easier. And that’s a huge problem during mergers and acquisitions. When it comes to insider threats, business and security leaders are facing a harsh reality. Last year, there were 50,000 mergers and acquisitions (M&A) transactions worldwide, with a total value of about $4
Threat actors increasingly using malicious URLs, HTTPS domains, file-sharing sites in email attacks, FireEye says. Email continues to be an extremely effective vector for delivering malicious content because of how adept attackers have become at tricking users over the years. The latest examples include the increasing use of malicious URLs in emails rather than attachments,
With a blurred line between home and business, what’s the true risk of connected devices? According to Gartner, 8.4 billion connected “things” were in use last year. Although these devices bring convenience and ease, they also significantly expand the attack surface. Cyber criminals are already working out that they can manipulate the IoT for their
They may look familiar to you, and that isn’t a coincidence. New threats are often just small twists on old ones. Cyberattackers are often thought to be tech experts. Cyberattackers understand security vulnerabilities and loopholes that most people don’t understand. However, the reality of a cyberattacker is that most are not that specialized — they