Analysis: Colonial Pipeline Attack

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the Colonial Pipeline ransomware attack, the response and reactions from security leaders about the significance and potential ramifications of the incident

Analysis: Implications of the Pegasus Spyware Investigation

Data Breach Today

This edition of the ISMG Security Report features an analysis of ongoing investigations into the use of NSO Group's Pegasus spyware to spy on dissidents, journalists, political rivals, business leaders and even heads of state - and discussion of whether the commercial spyware business model should be banned.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Analysis: Sandworm's Hacking Campaign

Data Breach Today

This edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software.

Analysis: 'Cybersecurity Call to Arms'

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of British spy chief Jeremy Flemming’s "cybersecurity call to arms." Also featured: Insights on COVID-19 business continuity planning; the wisdom of the late Dan Kaminsky

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

Analysis: Emotet and Netwalker Takedowns

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of this week’s police takedowns of Emotet and Netwalker cybercrime operations. Also featured: Updates on passwordless authentication and the use of deception technology

2020 Breach Statistics: An Analysis

Data Breach Today

data breaches in 2020 isn't all good news; it reflects that hackers are changing their tactics, says James Lee of the Identity Theft Resource Center, who offers an analysis of the center's new data breach report

Analysis: Changing Nature of Ransomware Attacks

Data Breach Today

This edition of the ISMG Security Report features an analysis of comments from the former head of Britain's GCHQ intelligence agency, Robert Hannigan, on the changing nature of ransomware attacks.

Analysis: Threat Landscape Report

Data Breach Today

Louis Marinos of the European Cybersecurity Agency offers an analysis of the agency's new Threat Landscape 2020 report, which shows how cybercriminals have been advancing their capabilities, adapting quickly and targeting victims

Analysis: Feds Crack Down on Cryptocurrency Scams

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of a federal crackdown on ICO cryptocurrency scams. Also featured: An update on the SonicWall hack investigation and the use of digital IDs to verify COVID-19 testing

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Analysis: Russia's Sandworm Hacking Campaign

Data Breach Today

This edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software.

Analysis: Microsoft Exchange Server Hacks

Data Breach Today

This edition of the ISMG Security Report features an analysis of the Microsoft Exchange on-premises server hacks – from who might have leaked the vulnerability exploits to how ransomware gangs are taking advantage of the flaws.

Analysis: Why Ransomware Is No. 1 Cyberthreat

Data Breach Today

This edition of the ISMG Security Report features a discussion about why the head of Britain's National Cyber Security Center says the No. 1 cyber risk is not nation-state attackers but ransomware-wielding criminals. Also featured: Western Digital IoT flaws; an FBI agent tracks cybersecurity trends

ISMG Editors’ Panel: Analysis of Kaseya Attack

Data Breach Today

Sizing Up the Impact of the Ransomware Attack and How to Mitigate Risks In the latest weekly update, a panel of Information Security Media Group editors discusses the repercussions of the Kaseya ransomware incident, the immediate response of the cybersecurity community and key risk management takeaways.

The Unexpected Cost of Data Copies

This paper will discuss why organizations frequently end up with multiple data copies and how a secure "no-copy" data strategy enabled by the Dremio data lake service can help reduce complexity, boost efficiency, and dramatically reduce costs.

Analysis: City of Tulsa's Ransomware Response

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the city of Tulsa's decision to refuse to pay a ransom following an attack. Also featured: Johnson & Johnson's CISO on shifting priorities; mitigating quantum computing risks

Analysis: CISA's Conclusions on Firewall Missteps

Data Breach Today

This edition of the ISMG Security Report features an analysis of CISA's finding that agencies could have prevented follow-on attacks after the SolarWinds supply chain attack by properly configuring firewalls.

Analysis: The Impact of SolarWinds Hack

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of what we know so far about the impact of the SolarWinds supply chain hack and how to respond

Analysis: The Latest SolarWinds Hack Developments

Data Breach Today

This edition of the ISMG Security Report features an analysis of the very latest information about the SolarWinds hack. Also featured are discussions of "zero trust" for the hybrid cloud environment and data privacy regulatory trends

Analysis: REvil’s $50 Million Extortion Effort

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of ransomware gang REvil’s threat to release stolen Apple device blueprints unless it receives a massive payoff.

Analysis: 2020 Health Data Breach Trends

Data Breach Today

Ransomware, Phishing Incidents, Vendor Hacks Prevail Hacking incidents, including ransomware and phishing attacks, as well as security incidents involving vendors dominated the federal tally of major health data breaches in 2020

Analysis: Ransomware Gang Disrupts Global Meat Production

Data Breach Today

The latest edition of the ISMG Security Report details the ongoing wave of ransomware attacks, including the disruption of JBS, the world's largest supplier of meat.

Analysis: Fat Face's Awkward Breach Notification

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of retailer Fat Face’s awkward "strictly private and confidential" data breach notification.

Retail 170

Analysis: Takeaways From Ransomware Gang Interviews

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of recent “tell-all” interviews with members of ransomware gangs. Also featured: insights on securing IoT devices and mitigating insider threat risks

IoT 163

Analysis: The Latest Ransomware Trends

Data Breach Today

This edition of the ISMG Security Report features an analysis of the very latest ransomware trends. Also featured: Discussions of Microsoft's move to DNS over HTTPS and strategies for tackling IoT security challenges

Analysis: McAfee's Planned IPO

Data Breach Today

The latest edition of the ISMG Security Report analyzes cybersecurity firm McAfee's plans to again become a publicly traded company. Also featured: 'Zero trust' strategic insights and an IoT security flaw saga

IoT 153

Expert Analysis: The Battle Against Ransomware

Data Breach Today

This edition of the ISMG Security Report features three segments on battling ransomware.

Analysis: How Will Biden Address Cybersecurity Challenges?

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the cybersecurity challenges the Biden administration must address. Also featured: payments security advice from Verizon; the outlook for the lifting of restrictions tied to the COVID-19 pandemic

Analysis: Apple iOS 'Zero-Click Exploit'

Data Breach Today

This edition of the ISMG Security Report features an analysis of a serious Apple iOS "zero-click exploit" that could have allowed hackers to remotely gain complete control of a device.

Analysis: Securing RDP to Prevent Ransomware Attacks

Data Breach Today

Also featured: A look at three likely scenarios for the COVID19 pandemic, and an analysis of why we're still using PINs for certain card payments The latest edition of the ISMG Security Report discusses securing RDP to prevent ransomware attacks.

Tom Kellermann: Post-Election Security Analysis

Data Breach Today

Cybersecurity Strategist Warns of Pre-Inauguration Nation-State Strikes The good news: U.S. election security measures seem to have worked. The bad news: Disinformation and misinformation campaigns continue.

Analysis of FireEye Breach: Is Nothing Safe?

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of why the FireEye breach is a wake-up call for the cybersecurity industry. Also featured: Monero cryptocurrency scams; key considerations for cloud security

Cloud 163

Analysis: Russia's COVID-19 Disinformation Campaign

Data Breach Today

The latest edition of the ISMG Security Report analyzes how and why Russia is spreading disinformation about the COVID-19 pandemic. Plus: the latest CCPA regulation updates; a CISO's tips on securely managing a remote workforce

Analysis: HIPAA Enforcement in a Biden Administration

Data Breach Today

HHS Issues 10th 'Right of Access' Settlement; Will Such Actions Continue? The Department of Health and Human Services last week issued its 10th settlement involving a HIPAA "right of access" case since launching its patient records access initiative last year.

Access 222

Analysis: Keeping IoT Devices Secure

Data Breach Today

This edition of the ISMG Security Report analyzes whether IoT devices will outlive their security updates. Also featured: Why security spending needs to shift further upstream; could banks be custodians of identity

IoT 181

Analysis: Implications of Water Treatment Plant Hack

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the critical security issues raised by the hacking of a Florida city water treatment plant.

Analysis: Facebook Breach's Impact

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the latest developments in Facebook's massive data breach and expert analysis of the potential for nation-state interference in the U.S. midterm elections

Analysis: Ransomware's Costly Impact

Data Breach Today

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims.

Analysis: Indictments in Equifax Hack

Data Breach Today

The latest edition of the ISMG Security Report analyzes the indictments of four Chinese military officers in connection with the 2017 Equifax data breach. Also featured: Advice on implementing NIST's new privacy framework; lessons learned in a breach disclosure