As cyber-attacks increase in complexity, frequency, and velocity, in our experience, many enterprise organizations are reliant on outdated IT governance. The organizational paradigm is limited by slow-moving bureaucracy and scarce resources. This situation is often the result of a limited understanding of the risks on...
Citrix is urging customers to implement a newly provided enhancement to its ADC and Gateway devices that is designed to block attackers from abusing the Datagram Transport Layer Security, or DTLS, protocol to amplify distributed denial-of-service attacks.
Distributed denial-of-service attacks have not garnered much attention this year. But analysts say such attacks could surge, and they have the potential to be just as damaging as ransomware and other types of cyberthreats.
Consider what is expected of you in the year or so ahead. How fast and secure can you deliver applications and solutions? How do you compare to your competitors? What tools and methods are you using to become faster and better at what you do?
This spring, 2,200 IT professionals and senior IT leaders participated...
In today's IT environment, one of the biggest risks to a corporation's valuation is a security breach. Security Vendors make wide claims about the effectiveness of their products - making it almost impossible to identify the right vendor for your security needs.
From scanners and traditional pen tests to bug bounty...
Breaches are all too common today as determined cyber criminals have become better organized and more targeted in their attacks. In many cases, a C-level executive loses their job as a result. That doesn't have to be you or your organization.
The right security testing solution is key to keeping you safe. From...
Ransomware attacks remain the top cyber-enabled threat seen by law enforcement. But phishing, business email compromises and other types of fraud - many now using a COVID-19 theme - also loom large, Europol warns in its latest Internet Organized Crime Threat Assessment.
The U.S. Cybersecurity and Infrastructure Security Agency is warning of an increase in targeted distributed denial-of-service attacks against financial and government organizations worldwide. And security firms also are tracking the incidents in these and other sectors.
The start of classroom and online instruction at Hartford Public Schools in Connecticut was canceled Tuesday as a result of a ransomware attack - the latest in a series of online attacks, including distributed denial-of-service disruptions, that have interrupted some schools' return to teaching this fall.
While nearly three-quarters of cybersecurity professionals would grade their organization's
ability to identify and mitigate a cyberattack, as above average or superior, nearly half have
been subject to a spear-phishing attack and a third have suffered a malware incident in the
last year. Further, over half of...
Lucifer, a botnet that has been infecting Windows devices with cryptominers and using compromised systems for distributed denial-of-service attacks, now has the ability to compromise Linux-based systems as well, according to Netscout's ATLAS Security Engineering & Response Team.
It's common for security researchers to be ignored when reporting a software vulnerability. The latest example - vulnerabilities found by Independent Security Evaluators in a router made by China-based Tenda.
Last year, 81 percent of organizations experienced one or more successful cyberattacks.
That's just one revelation in the 2020 Cyberthreat Defense Report that will make you reevaluate your security posture.
Filled with key insights and statistics, you'll learn how your IT security peers cope in a world that's...
A massive DDoS attack generating 809 million packets per second was recently directed against a large European bank, according to the security firm Akamai, which describes in a new report the unusual approach the attackers took.
In today's dynamic cyber world, third-party security is necessary but can be challenging to implement. How did a leading investment firm succeed in creating a robust and efficient third-party security process?
In this exclusive webinar, CAPTRUST IT Governance, Risk, and Compliance leader Jon Atchison will discuss the...