The new Panda Security Threat Insights Report 2020 compiled by PandaLabs – anti-malware laboratory and security operations center (SOC) –illuminates several emerging trends in the cybersecurity space.
Although distributed denial-of-service (DDoS) is an old school attack vector, it continues to be a serious threat to organizations. The monthly number of such attacks exceeds 400,000. To top it off, cybercriminals keep adding new DDoS mechanisms to their repertoire and security providers aren’t always prepared to tackle them. Here are 26 different types of DDoS attacks your security team needs to be ready for.
As we enter the new decade, we stand reminded that technological innovation and cybersecurity threats continue to develop and evolve at an incredible pace. Firms must therefore continue to build the proper defenses to protect consumer confidential data and financial market integrity. Cyber threats have become one of the top threats to the financial services sector and the ability of firms to be resilient in the face of these threats is paramount.
More companies are doing more business online to survive the pandemic, and that’ll create even more data privacy concerns going forward. At the same time, new privacy regulations have taken hold, most notably the California Consumer Privacy Act. What are 5 steps to achieve compliance?
COVID-19 has impacted every facet of life and business. Millions of people around the world have been working from home to collectively slow the spread of the coronavirus. However, as the global workforce migrates from physical corporate locations to less-secure home offices, this new reality creates increased cyber threats, as employees exchange what can be sensitive data in order to prevent business operations from coming to a standstill.
If you could choose three things that would enhance your security program, which three would you choose? In a new poll, the Security Executive Council (SEC) wanted to find out what elements would add the most value to security leaders and their teams.
The number of new identity records and the depth of personal information available in exfiltrated data are expanding, creating a blueprint of digital identities that threat actors can weaponize and expose identity information.