As detailed in a new Area 1 Security report, threats ranging from ransomware, credential harvesters to difficult-to-discover but costly business email compromise targeted inboxes, could have resulted in over $354 million in direct losses had they been successful.
In this piece, we look at what the Protect Duty law in the U.K. will look like, how it might impact legal requirements in other countries, and how security professionals in the U.S. and beyond can use the findings of the inquiry to fulfill their ethical responsibility to keep visitors and staff as safe as possible.
Ernie Anderson, Head of Professional Services at Kudelski Security, speaks to Security about the importance of a deputy chief information security officer (CISO) and why this position is critical to addressing security risk management.
With the proliferation of ransomware attacks, every business feels the pressure—and often a sense of futility—in defending against cybercriminals. But companies can regain control by focusing on one of the most common attack vectors: Active Directory.
According to a watchdog report, U.S. Census Bureau computer servers were exploited in January 2020 during a cybersecurity attack, but hackers’ attempts to keep access to the system were unsuccessful.
HP Wolf Security released the findings of a global survey of 1,100 IT Decision Makers (ITDMs), examining their concerns around rising Nation State attacks: 72% of respondents said they worry that nation-state tools, techniques, and procedures (TTP) could filter through to the dark net and be used to attack their business.
Security spoke to Bill Wright, Director of Federal Government Affairs at Splunk, for a deeper dive into strategies federal organizations can use to facilitate expedited zero trust adoption.
According to news reports, California-based medical startup Total Testing Solutions has removed a website that allowed customers to access their test results after a customer found a vulnerability that allowed access to other people’s personal information.