The latest edition of the ISMG Security Report offers an analysis of the phases businesses will go through in the recovery from the COVID-19 pandemic, plus an assessment of new risks resulting from the work-at-home shift and lessons learned from the Equifax breach.
Supermarket giant Morrisons is not liable for a data breach caused by a rogue employee, Britain's Supreme Court has ruled, bringing to a close the long-running case - the first in the country to have been filed by data breach victims.
Hotel giant Marriott, which in 2018 disclosed that it had suffered one of the worst data breaches in history, is now warning that it suffered a new breach earlier this year that exposed personal details - although not payment card information - for 5.2 million customers.
Traditionally, security teams look to penetration tests and red teaming to test and build confidence in their security programs. These options are often costly, time-consuming, and limited in scope. There is a better way to gain confidence in security models: continuous attack simulations, which automate adversary...
The attack surface is constantly expanding, with threats continuing to keep pace with the evolution in infrastructure and digital transformation, says Leah MacMillan, chief marketing officer of Trend Micro.
Security firm Emsisoft is offering free, customized decryptors to victims of PwndLocker ransomware, which first surfaced in late 2019 and has been tied to attacks against Lasalle County in Illinois and the Serbian city of Novi Sad, with the gang demanding up to $660,000 or more in bitcoins from its victims.
The security skills shortage has been well documented over the years. It remains a salient problem for most enterprises as 66% of respondents to a 451 Research 2019 survey still say they do not have enough information security personnel on staff, and 33% specifically cited pen-testing skills as not meeting their...
When it comes to the cyberattacks, very few are as scary as the Advanced Persistent
Threats (APTs). The National Institute to Standards and
Technology (NIST) defines it as "a long-term pattern of
targeted, sophisticated attacks."
Threat actors are using more sophisticated attack methods which may go undetected...
Testing the cybersecurity posture of an organization or its
cybersecurity resilience to cyberattacks, has come a long
way. The demand for the latest and most comprehensive
testing solutions continues to grow to counter
the ever-increasing wave of cybercrime. Until
recently, the information security...
At the core of cybersecurity, every leader has just one ultimate question: 'Have we been compromised?" And yet that remains the most difficult question to answer with certainty, says Ricardo Villadiego, CEO of Lumu Technologies.
The latest edition of the ISMG Security Report analyzes the indictments of four Chinese military officers in connection with the 2017 Equifax data breach. Also featured: Advice on implementing NIST's new privacy framework; lessons learned in a breach disclosure.
Time for a fresh edition of "learn from how others get breached" focusing on Equifax. The goal is not blame, but rather to highlight specific missteps so others can avoid making the same mistakes. The Equifax breach offers a plethora of takeaways to help organizations better repel attackers.
Four members of China's People's Liberation Army have been indicted for allegedly hacking Equifax in 2017 and stealing the personal data of over 145 million Americans as well as a vast trove of the company's trade secrets and intellectual property, the U.S. Justice Department announced Monday.