In 2016, many organizations were victims of ransomware attacks while others believe they will become a target this year.
Fifty-two percent of security leaders rate their organizations at above average or superior when it comes to detecting or blocking ransomware before it locks or encrypts data in their systems....
Like many other inventions now common in modern life, distributed cybercrime may seem trivial today. But this concept emerged little more than a decade ago and has already dominated the threat landscape.
In 2010, a computer security firm in Belarus stumbled upon Stuxnet, a mysterious virus of unparalleled complexity that was attacking systems in Iran. Unlike any other virus or worm built before, this one didn't just simply hijack the targeted computers or steal information from them, it escaped the digital realm to...
Cyber-extortion has reached new proportions, with a wide variety of methods, such as distributed-denial-of-service attacks and ransomware variants, being used to extort individuals and organizations. Ransomware-DDoS hybrid attacks, like Cerber, have showcased how attackers have added DDoS capabilities to ransomware....
Deception is the most successful strategy in military history. Just as armies used deceit to conquer continents, cyber-deception is being used by more and more organizations to exploit a hacker's greatest weakness - being a human, after all, behind a keyboard. Deception techniques such as honeypots are not a new. But...
Making the right decisions about how to deploy Office 365 can be a show-stopper, particularly as you consider branch office and remote user connectivity. Each Office 365 user generates between 12 and 20 persistent connections. Each connectivity option, ExpressRoute, hub-and-spoke or direct-to-Internet, deals with this...
This monthly Security Agenda will highlight some of the most recent additions to our course library. March's edition features Former Federal CISO
Gregory Touhill giving a "Cyber State of the Union." Other industry influencers like Retired RSA Chair Art Coviello, FBI Cyber Division Supervisory Special Agent Jay...
The business of the cyberattack has matured into a billion dollar industry. Forrester even predicts the devastating effects of a cyberbreach will lead to the failure of a Fortune 1000 company in 2017 (Predictions 2017: Cybersecurity Risks Intensify, November 2016, Forrester). Extortion-based attacks like ransomware...
As challenging as ransomware has proven to be against so many organizations across regions and sectors, certain characteristics actually can help defenders gain an edge at detecting malware. Lastline's Engin Kirda explains how.
"Ransomware is a threat that needs to be taken seriously," says Kirda, cofounder and chief...
With Verizon's data breach investigations team finding that 90 percent of breaches trace to a phishing or other social engineering attack, lead investigator Chris Novak says that using multifactor authentication should be a no-brainer for all organizations.
This monthly Security Agenda will highlight some of the most recent additions to our course library. February's edition features Gartner analyst Avivah Litan discussing "Endpoint Detection and Behavioral Analytics." Other industry influencers like RSA's Principal Manager of Identity Protection, Angel Grant, Co-Founder...
Cyber crime and money laundering are growing and evolving at a faster rate than many organizations can keep pace with, especially while staying within regulatory requirements. The result is an uncertain and rapidly-changing global financial landscape.
Download this white paper to:
Better understand the threat of...
There has been a proliferation of ransomware attacks against healthcare organizations that has ushered in a new wave of extortionware and a new generation of malware attacks. While these types of attacks are not new, they have become more insidious, sophisticated and are growing in popularity.
In order to defend...
From headline-making data breaches to hacktivist attacks, there never have been so many high-profile incidents, which in turn have sparked greater public awareness of information security risks.
Now, more than ever, regulators, board members and even customers are asking smart questions about information security,...
This session will review ransomware, exploring why it continues, how to battle it and what the future portends. Using real-world examples, Ralph Smith of the Financial Services Information Sharing and Analysis Center will walk through some recent ransomware campaigns that have been waged against FS-ISAC members, and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.