Tag Archives: threat

Business needs to reduce cyber threat to payment card data

In the retail sector, almost all of the data breaches involve some kind of compromise to cardholder data, which is a trend that is expected to increase.

Despite investment in security and compliance, 2018 shows

Read more at: http://www.computerweekly.com/news/450433346/Business-needs-to-reduce-cyber-threat-to-payment-card-data

Returning the power to your security teams with threat hunting

As more advanced attack techniques and tools become more accessible in the cyber criminal community, companies are increasingly turning to a more proactive approach to security. An important part of this approach is looking for evidence of potential threats which may already be in their systems.

Implementing an incident response (IR) plan is a great place to start, but is too reactive – by the time you are notified of a breach, it could be too late. Likewise, organisation have now realised that waiting for antivirus and other security solutions to alert them of unusual activity is not a good enough approach for detecting sophisticated and stealthy adversary. 

Instead, organisations can combine an IR plan and traditional AV defences with more proactive techniques such as threat hunting to give organisations the best chance to avoid cyber criminals gaining access to their IT environment. Threat hunting enables security teams to confidently answer the

Read more at: https://www.itproportal.com/features/returning-the-power-to-your-security-teams-with-threat-hunting/

Companies test defences against new cyber crime threat

Keep abreast of significant corporate, financial and political developments around the world. Stay informed and spot emerging risks and opportunities with independent global reporting, expert commentary and analysis you can trust.

Read more at: https://www.ft.com/content/18bbb9c6-e451-11e7-97e2-916d4fbac0da

Executive Insights: 2017 Threat Trends – Looking at Our Threat Reports

The expanding attack surface

2017 was the year of digital transformation. Traditional network environments were upended by the rapid adoption of things like cloud infrastructure and cloud-based applications and services, the virtualization of data centers, the integration of billions of new, connected IoT devices, and the continued expansion of mobility, BYOD, and related applications.

Because this change has happened so rapidly, many organizations have had to scramble to find ways to extend security to new network ecosystems, devices, and applications. For example, organizations today use an average of about 200 different applications, ranging from productivity tools used internally, to consumer-facing applications that provide quick access to data and enable tap-of-the-screen transactions. These applications span from remote devices to cloud services, and mine deep into the data center for real-time information. The number of high-profile data breaches and the resulting theft of hundreds of millions of data

Read more at: https://securityboulevard.com/2017/12/executive-insights-2017-threat-trends-looking-at-our-threat-reports/

Executive Insights: 2017 Threat Trends – Looking at Our Threat …

The expanding attack surface

2017 was the year of digital transformation. Traditional network environments were upended by the rapid adoption of things like cloud infrastructure and cloud-based applications and services, the virtualization of data centers, the integration of billions of new, connected IoT devices, and the continued expansion of mobility, BYOD, and related applications.

Because this change has happened so rapidly, many organizations have had to scramble to find ways to extend security to new network ecosystems, devices, and applications. For example, organizations today use an average of about 200 different applications, ranging from productivity tools used internally, to consumer-facing applications that provide quick access to data and enable tap-of-the-screen transactions. These applications span from remote devices to cloud services, and mine deep into the data center for real-time information. The number of high-profile data breaches and the resulting theft of hundreds of millions of data

Read more at: https://securityboulevard.com/2017/12/executive-insights-2017-threat-trends-looking-at-our-threat-reports/

2017 Threat Trends – The Year in Review

2017 was another landmark year for cybersecurity. In reviewing our quarterly Threat Landscape reports, it is clear that 2017 has been notable primarily for three things: the rapid digital transformation and expansion of the potential attack surface, the increasing sophistication of cyber attacks, and a lapse in basic cybersecurity hygiene, largely being driven by digital transformation coupled with the growing cybersecurity skills gap.

Let’s take a look at some of the issues that have challenged the cybersecurity community.

The expanding attack surface

2017 was the year of digital transformation. Traditional network environments were upended by the rapid adoption of things like cloud infrastructure and cloud-based applications and services, the virtualization of data centers, the integration of billions of new, connected IoT devices, and the continued expansion of mobility, BYOD, and related applications.

Because this change has happened so rapidly, many organizations have had to scramble to find ways to extend security to new

Read more at: https://www.csoonline.com/article/3243062/security/2017-threat-trends-the-year-in-review.html

2017 Threat Trends – The Year in Review | CSO Online

2017 was another landmark year for cybersecurity. In reviewing our quarterly Threat Landscape reports, it is clear that 2017 has been notable primarily for three things: the rapid digital transformation and expansion of the potential attack surface, the increasing sophistication of cyber attacks, and a lapse in basic cybersecurity hygiene, largely being driven by digital transformation coupled with the growing cybersecurity skills gap.

Let’s take a look at some of the issues that have challenged the cybersecurity community.

The expanding attack surface

2017 was the year of digital transformation. Traditional network environments were upended by the rapid adoption of things like cloud infrastructure and cloud-based applications and services, the virtualization of data centers, the integration of billions of new, connected IoT devices, and the continued expansion of mobility, BYOD, and related applications.

Because this change has happened so rapidly, many organizations have had to scramble to find ways to extend security to new

Read more at: https://www.csoonline.com/article/3243062/security/2017-threat-trends-the-year-in-review.html

North Korea’s army of cyber hackers could be an even greater threat than their nuclear ambitions, experts warn

  • Stalinist state has an army of 6,000 hackers that target banks and infrastructure
  • They have also been blamed for hacks on secret South Korean military plans 
  • Now experts have warned state’s cyber army could be more lethal than its nukes
  • There are also fears it could hack the Winter Olympics in South Korea next year 

Iain Burns For Mailonline

Bitdefender 2017 global e-threat landscape – key findings

Data breach statistics from aggregators globally paint a gloomy picture of the cyberspace we inhabit. More data records were leaked or stolen in the first half of 2017 than in all of 2016, and the future is looking just as bleak. Luckily, users have plenty of solutions to choose from to secure their data and privacy.

As 2017 draws to a close, Bitdefender is releasing a fresh set of data looking at the most prevalent cyber-attacks and the malware employed to conduct them. Chief among these e-threats: ransomware.

Ransomware ‘in-chief’

Taking the lion’s share as the most frequently-encountered threat, different ransomware families grew to 160+ this year alone, with dozens or (in some cases) even hundreds of variations per family. The most prolific ransomware strains this year were Troldesh / Crysis and GlobeImposter.

One in six spam e-mail messages comes bundled with some form of ransomware – either the malware itself is present in the

Read more at: https://www.techadvisor.co.uk/feature/security/bitdefender-2017-global-e-threat-landscape-key-findings-3669122/