Australia's data regulator has found that Uber interfered with the privacy of 1.2 million of its customers as a result of a 2016 global data breach. Uber says it's made improvements to its systems and its internal security policies.
This edition of the ISMG Security Report features an analysis of ongoing investigations into the use of NSO Group's Pegasus spyware to spy on dissidents, journalists, political rivals, business leaders and even heads of state - and discussion of whether the commercial spyware business model should be banned.
As ransomware continues to pummel organizations, if they do get hit, then from an incident response standpoint, what are the essential steps they should take to smooth their recovery? Veteran ransomware-battler Fabian Wosar, CTO of Emsisoft, shares essential steps and guidance for recovery.
Cyber attacks on critical infrastructure are on the rise. A recent survey found that 9 out of 10 OT organizations experienced at least one intrusion in the past year.
Read the solution brief to learn:
Why operational technology endpoints are vulnerable
How FortiEDR addresses challenges of OT environments
With traditional endpoint security solutions, it’s not a matter of if a security breach happens, but when. These EDR solutions not only lack the ability to keep pace with modern threats, but come with hidden costs that drain budgets and slow operations.
Advanced attacks can take just minutes, sometimes even seconds, to compromise endpoints. First-generation endpoint detection and response (EDR) tools simply cannot keep pace. They require manual triage and responses that are not only too slow but also generate many alerts. Such solutions drive up the cost of security...
As much as public cloud use is growing, both in total volume and in diversification of services, it is not a one-way trend. To meet evolving business needs, organizations are moving applications and workloads back and forth between cloud and on-premises environments.
Today’s organizations rely heavily on cloud applications in order to be at the forefront of digital innovations, and to keep their users connected and their businesses thriving. Cloud innovations help keep organizations competitive in the ever-changing and demanding digital marketplace, with new applications and...
Cloud computing has transformed how we consume and deploy IT solutions. Compute power is rapidly evolving to a utility model, with shared infrastructure at its core. This shared infrastructure underpinning the cloud revolution has also driven a fundamental shift in how we design and deploy technology within the data...
Saudi Aramco, one of the world's largest oil and natural gas firms, has confirmed that company data was leaked after one of its suppliers was breached. Extortionists are reportedly demanding a $50 million ransom - payable in monero cryptocurrency - for a promise to delete the stolen data.
Building business resilience through a "zero trust" approach requires role-based authentication, user access velocity checks, and monitoring people, processes, and technologies, a panel of experts says.
Cybereason, Rapid7 and Microsoft announced acquisitions this week designed to boost their security capabilities. Meanwhile, DevOps security firm Sysdig made a move to add infrastructure-as-code security to its portfolio.
How can insurers take advantage of face authentication to verify customer identity online and prevent fraud?
We've all heard gruesome stories of people hiding a corpse so they can continue to claim a friend or relative's pension. Unfortunately, deepfakes and other technology make it much easier for fraudsters to...
Three federal agencies released a 31-page Joint Cybersecurity Advisory Monday that describes 50 tactics, techniques and procedures that Chinese state-sponsored cyberattackers are using to target organizations in the U.S. and allied nations.
For the eighth time running, Splunk was named a "Leader" in Gartner's 2021 Magic Quadrant (MQ) for Security Information and Event Management (SIEM).
Thousands of organizations around the world use Splunk as their SIEM for security monitoring, advanced threat detection, incident investigation and forensics,...