Advertise

Advertise

A Focused Approach to Zero Trust

The evolution of IT has greatly outpaced that of cybersecurity. While security hasn’t stood still, it hasn’t progressed effectively to address today’s digital and gig economy realities. Here are some reasons why this is so. IT is distributed, hybrid and on-demand, broadening the scope of your attack surface. The workforce, like today’s data, is mobile, and…

Nearly half of firms suffer a data breach at the hands of vendors

As trusted partners, third-party vendors often become the overlooked or unwitting accomplice in criminal activities. As privacy laws and cybersecurity regulations continue to increase accountability around data confidentiality and protection, eSentire wanted to know how seriously firms take the risks associated with third-party vendors, and their vendors’ vendors. Earlier this year, eSentire commissioned Spiceworks to…

Uncomfortable Truth #1 about Phishing Defense

Part 1 of a 5-part series.    The threat posed by phishing is not new. For many years, the media and research papers have been littered with examples of data breaches that have been traced back to phishing attacks.   Organizations have attempted to tackle the threat through investments in next-gen technologies and increased employee…

What is a Threat Intelligence Platform?

Threat actors are constantly evolving and advancing their attacks. Organizations seek to gain context on these attacks by leveraging threat intelligence, which is actionable information about adversaries and their Tactics, Techniques, and Procedures (TTPs). A threat intelligence platform (TIP) is a solution that automates the machine labor of threat intelligence, reduces time to detection, and…

Information Technology: Leading the way

Increased demandSEEK Australia recently revealed the top 20 highest paying industries in Australia with Information Technology topping the leader board at number one. Kendra Banks, Managing Director at SEEK ANZ said: “What we are seeing is that candidates in information and communication technology are more motivated by salary and compensation than those in any other…

How important are soft skills in analytics

The field of data science is vast, and data scientists are expected to be skilled in a range of areas such as machine learning, data visualisation and data mining; at times, it can feel like you are only scratching the surface. It’s impossible to master all the tools and software available, but it’s important to…

Seven Steps to Secure Privileged Access

Gartner released the first-ever Magic Quadrant for Privileged Access Management,1 shining a spotlight on what may be the largest security vulnerability enterprises face today. Privileged accounts, credentials and secrets are “the keys to the kingdom” and they exist everywhere —on-premises, in the cloud, across DevOps environments and on endpoints. Attackers know this, which is why a…

Best phishing lures: 6 of the top 10 real phishes use ‘invoice’ as the subject

Not since the Beatles has a Top 10 chart been dominated like this. According to Cofense Intelligence, the subject “Invoice” appears in 6 of the 10 most effective phishing campaigns in 2018. Not only that, “Customer Invoice” snags the #7 spot. The other 3 winners also pose as financial transactions: “Payment Remittance”, “Statement”, and “Payment”.…

Say “Ah!” A closer look at phishing in the healthcare industry

How resilient is healthcare to phishing? Healthcare is a favorite – and profitable – target for cyberattacks. If you work for a healthcare company, or if you’re a patient or subscriber, you’re familiar with all the data the industry gathers and threat actors crave: name, date of birth, Social Security number, mailing address, email address,…

Phishing-Specific SOAR Gets You to Mitigation Faster

When a malicious email slips past perimeter tech defenses, you need to find it and respond in minutes, not two or three months. But no one has unlimited budget or staffing to sift through phishing alerts, verify threats, and help stop attacks in progress. To analyze and respond to emails faster, CofenseTM adds the power…

Next post in Advertise