CyberGRX and Ponemon Institute surveyed 581 IT security and 302 C-suite executives to determine what impact digital transformation is having on cybersecurity and how prepared organizations are to deal with that impact. In some instances, we highlight the differences between IT Security and C-level respondents....
Kaiji, a newly discovered botnet, is compromising Linux servers and IoT devices using brute-force methods that target the SSH protocol, according to the security firm Intezer. The botnet has the capability to launch DDoS attacks.
Security and risk experts from Forrester and Neustar advise on what you need to know about today's cyberthreats, including website vulnerabilities, APIs, third-party party scripts, nefarious bots and DDoS attacks.
We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. But this particular supply chain attack was an attack on a service provider.
Download this case study to learn how to quickly mitigate third-party security risks.
New Exploits and Increased Relevance of Distributed Denial of Service (DDoS) Attacks
The number of DDoS attacks increased 180% in 2019. Are you prepared for 2020? Learn what you need to know from our Security Operations Center (SOC) in order to protect your organization before an attack happens.
Case study: Learn about several companies' experiences using Neustar UltraDDoS Protect
DDoS attacks represent a consistent and persistent threat to the digital operations and security of organizations everywhere. The attacks can be used to severely degrade network performance to the point of inoperability.
Cryptomining malware has exploded on the threat landscape, becoming one of the most common malware attacks and posing a significant risk to your IT assets.
In this whitepaper learn everything you need to know about cryptomining including:
What it does
How it gets in
How to recognize and prevent it
Users - One of the Weakest Links in Your Cybersecurity Strategy
They say 'it's all about who you know' - for cybersecurity, that's partially true. If a cyberattacker knows your users, there's a good chance they can get into your network. Why? Because they can take what they know - usually an email address or...
The "human factor" has become a key discussion point in the cyber security community; the humans behind both threats and security have been sorely overlooked. Even the CISO, the conductor at the head of every security team, has been an elusive figure.
Nominet interviewed 400 CISOs and 400 C-Suite executives on the...
Step out of the server room and into the boardroom.
The role of the CISO is evolving dramatically. Today's CISOs need to possess technical skills and business acumen, plus the ability to communicate complex issues to non-technical board members.
This eBook provides practical solutions to help you thrive as a...
Security researchers are tracking a variant of the prolific Mirai botnet called Mukashi, that's taking advantage of vulnerabilities in network-area storage devices made by Zyxel and giving its operators the ability to launch DDoS attacks. Zyxel has issued a patch for the vulnerability.
Customers put their trust in companies to deliver on promises of security. The quickest way to lose customers is to betray that confidence, especially when it comes to their personal information.
Hackers understand that, too. They quickly adapt tools and techniques to disrupt that delicate balance. To truly...
Hackers and cybercriminals have reached a level of maturity and efficiency unsurpassed in the history of cyberwarfare, resulting in a dramatic increase in attack frequency, complexity and size.
Although these threats constitute a clear and present danger to organizations worldwide, knowledge is power. This Hacker's...