Interpol Calls For New Ransomware Mitigation Strategy

Data Breach Today

The Agency Will Elevate the Role of National Central Bureaus to Fight Cybercrimes Interpol has announced that it will boost the role of country-specific National Central Bureaus to fight ransomware and other cybercrimes.

The Impact of COVID-19 on Cybersecurity Strategies

Data Breach Today

Joe Nocera and Vikas Agarwal Analyze PwC Survey Findings The 2021 PwC Global Digital Trust Insights survey shows 96% of businesses will adjust their cybersecurity strategies as a result of the COVID-19 pandemic.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Insights on Revamping Recovery Strategies

Data Breach Today

Experts at Dell Technologies and Unisys Discuss Current Threats and Best Security Practices In a joint video interview, David Finley at Dell Technologies and Andrew Peters at Unisys offer insights on enterprise strategies for disaster recovery and cyber recovery in light of emerging threats

Strategies for Fighting Synthetic ID Fraud

Data Breach Today

People’s United Bank’s Karen Boyer on Using Consumers' Devices for Authentication To mitigate the fraud risks posed by synthetic IDs, banks should use consumers' devices to help with authentication, says Karen Boyer, vice president of financial crimes and fraud intelligence at People’s United Bank, based in Connecticut.

What We Learned From Our Own Data-Driven ABM Strategy

ZoomInfo has created the following eBook to help other B2B organizations gain insights on how to launch their own data-driven ABM strategy. In this eBook, we will reveal the good and the bad from our own campaign and highlight some key takeaways on how to improve your ABM strategies moving forward.

Synthetic ID Fraud: Risk Mitigation Strategies

Data Breach Today

Meridian Credit Union's Saif Nawaz on Using New Technologies As synthetic ID fraud in the financial services sector continues to rise next year, organizations must use new technologies to mitigate the risks, says Saif Nawaz of Meridian Credit Union in Canada

Risk 191

Tips on Ransomware Defense Strategies

Data Breach Today

Caleb Barlow, CEO of CynergisTek, on Addressing the Challenges Healthcare institutions and nonprofits are suffering badly from ransomware attacks, says Caleb Barlow, CEO of CynergisTek, who offers insights on shoring up defenses

Australia to Update National Cybersecurity Strategy

Data Breach Today

Government Invites Feedback on Addressing Cyber Challenges The Australian government is looking to update its national cybersecurity strategy by 2020. In preparation, it's released a discussion paper that seeks input from citizens, the business community, academics and other stakeholders

Strategies for Securing Digital Transformation

Data Breach Today

PJ Maloney of DXC Technology and William "Buck" Houston of Micro Focus Global Alliances weigh in on new strategies for securing the transformation PJ Maloney and William 'Buck' Houston on Steps to Bolster Cyber Defense Digital transformation is the buzz across all sectors, but it poses significant security risks to enterprises.

Pentagon Releases Cloud Strategy for Operations Outside U.S. via NextGov

IG Guru

The post Pentagon Releases Cloud Strategy for Operations Outside U.S. Cloud IG News Information Governance information privacy information security Risk News Storage NextGov Pentagon StrategyCheck out the article here.

Cloud 52

2020 Database Strategies and Contact Acquisition Survey Report

As buyer expectations continue to heighten, marketing and sales teams are feeling pressured to deliver authentic messaging to buyers at every point of their customer journey. This report aims to highlight the current state of B2B database and contact acquisition strategies, and organizations’ goals to leverage data to fuel their go-to-market strategies in 2020 and beyond.

Building an Effective Ransomware Mitigation Strategy

Data Breach Today

Crowdstrike's Jennifer Ayers on Understanding the Indicators of Attacks To mitigate the risks posed by ransomware attacks, enterprises need to move from file-based security to a behavior-based approach, says Jennifer Ayers, vice president of the OverWatch division of Crowdstrike

Fileless Malware: What Mitigation Strategies Are Effective?

Data Breach Today

Security Practitioners Highlight Ways to Fight Against the Threat As the threat of fileless malware continues to persist worldwide, security professionals are devising targeted risk management strategies

Risk 147

5 Objectives for Establishing an API-First Security Strategy

Dark Reading

With APIs predicted to be the most common attack vector by 2022, an API-first security strategy is critical now more than ever

'Five Eyes' Intelligence Agencies Discuss Strategies

Data Breach Today

The latest edition of the ISMG Security Report describes a discussion among "Five Eyes" intelligence agencies at the recent CyberUK conference. Plus, an update on a Huawei 'backdoor' allegation and new research on managing third-party risk

Risk 185

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

Tips on Building a Robust Data Backup Strategy

Data Breach Today

In light of the threat of ransomware attacks, healthcare organizations need to take extra steps to ensure their systems are adequately backed up - and that those backups are protected, says Martin Littmann of Kelsey-Seybold Clinic.

Patch Management as a Risk Management Strategy

Data Breach Today

Chris Hallenbeck of Tanium Discusses Good Security Hygiene Significant security events have many techniques in common, says Chris Hallenbeck of Tanium, who describes why security hygiene improvement, especially patch management, is so essential

Risk 162

Japan's IoT Security Strategy: Break Into Devices

Data Breach Today

Nation to Allow Researchers to Brute-Force 200 Million Devices Japan plans to identity vulnerable internet of things devices the same way hackers do: by trying to log into them. The country wants to gauge its cybersecurity readiness for next year when it hosts the summer Olympics. If vulnerable devices are found, the plan is to notify device owners

IoT 180

Tips for a Bulletproof War Room Strategy

Dark Reading

The techniques used in real-world combat apply in cybersecurity operations, except that instead of bullets flying downrange, it's packets

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. However, there’s no team better suited to lead that charge than the marketing department.

How to Develop a Metadata Strategy


What’s the Importance of a Metadata Strategy? To avoid this, organizations should develop a metadata strategy. Many organizations use metadata in ways that provide significant business value. Every system uses metadata to store and retrieve data.

Ransomware Operators' Strategies Evolve as Attacks Rise

Dark Reading

Security researchers find ransomware operators rely less on email and more on criminal groups for initial access into target networks

UK emphasises cyber security in new foreign policy strategy

IT Governance

Under the new strategy, the government says it’s prepared to launch nuclear attacks if the country faced an exceptional threat that used cyber weapons or other “emerging technologies”. UK cyber security strategy.

DarkCrewFriends Returns with Botnet Strategy


The botnet can be used to mount different kinds of attacks, including code-execution and DDoS. Malware Vulnerabilities Web Security botnet Check Point code execution Content Management Systems darkcrewfriends file upload vulnerability php servers zero-day

A Proven Guide to Recruiting Passive Candidates

It's a simple, frustrating truth that you can't predict everything when it comes to recruiting for businesses. At some point in your role as a recruiter - perhaps more frequently than not - you'll need to fill a position quickly and you'll look for active recruitment strategies to do it. However, it's not efficient or cost-effective to be in the active recruitment mode all the time. It's important to also invest in building a passive candidate pipeline. Download the guide for tips that can help you build a recruitment strategy that attracts both active and passive candidates for the best possible mix.

Smart City: Bridging Strategy and Governance in a Smart City

Information Governance Perspectives

The post Smart City: Bridging Strategy and Governance in a Smart City appeared first on Rafael Moscatel. If we cower in the face of disruption, our ideas will get stale, our skillsets will grow old, and our energy to adapt will precipitously decline.

Developing a Cloud Adoption Strategy in Healthcare

Perficient Data & Analytics

In my last blog of this series, I examine how to develop a cloud adoption strategy and best practices. Three steps to cloud journey: Establish Strategy and Goals: Help engage senior members of IT and business leaders to understand all aspects of cloud and multiple options and approaches.

Cloud 61

Don't Let Scary Headlines Shape Your Company's Cyber-Resilience Strategy

Dark Reading

Resilience planning should be based on data and backed by technology, cybersecurity pros agreed at this week's RSA Conference

Attackers Seek New Strategies to Improve Macros' Effectiveness

Dark Reading

The ubiquity of Microsoft Office document formats means attackers will continue to use them to spread malware and infect systems


Best Practices for Accelerating the Sales Process

This eBook takes a look at three headache-free strategies you can employ today to accelerate selling the right way. Read on to learn how to adopt specific workflows and approaches that append your existing processes to deliver value to your prospects and internal counterparts.

A Fraud-Fighting Strategy for P2P Payments

Data Breach Today

Customer lifecyle data management can play an important role in cracking down on fraud tied to the growth in real-time P2P payments, says David Barnhardt of the security firm GIACT

The Bucketing Strategy as a Precautionary Solution

The Texas Record

Careful consideration of the connections between certain records in a retention schedule, anticipation of problems that may arise, and preparation to prevent those issues, such as using the bucketing strategy, will contribute to a more efficient, solid records management system.

Building Cybersecurity Strategies in Sub-Saharan Africa

Dark Reading

Evelyn Kilel and Laura Tich of Shehacks Ke discuss how they are working to build cybersecurity strategies that suit the needs and capabilities of developing nations

Why Your Business Needs a Long-Term Remote Security Strategy


Chris Hass, director of information security and research at Automox, discusses the future of work: A hybrid home/office model that will demand new security approaches. Breach Cloud Security InfoSec Insider Malware Mobile Security Web Security

Are You Ready For Predictive Analytics?

Speaker: Anita Lauper Wood, Product Strategist

Successful implementation of predictive analytics can feel unpredictable. There are risks that need to be consciously addressed, and successful implementation requires the right strategy. Join Anita Lauper Wood, Product Strategist, for a valuable session for product and technology leaders.

EDPB Publishes Its 2021-2023 Strategy

Hunton Privacy

On December 21, 2020, the European Data Protection Board (the “EDPB”) released its 2021-2023 Strategy (the “Strategy”). According to the Strategy, the EDPB will also provide further guidance on data protection by design and by default as well as on accountability.

4 Tips for Implementing a Mature Endpoint Security Strategy

Data Breach Today

Insights on Vulnerability Management and Incident Response An effective endpoint security strategy can be as layered as you want it to be. But you'll have a strong foundation if you build off of these four key steps

The Reaction to New White House Cybersecurity Strategy

Data Breach Today

Leading the latest edition of the ISMG Security Report: The reaction to the recently released White House cybersecurity strategy. Also featured: A discussion of GDPR's impact on class action lawsuits

GDPR 130

Is your SaaS pricing strategy optimized?

Information Matters

The post Is your SaaS pricing strategy optimized? Getting the pricing right for a SaaS product right is a potential minefield. Charge too little and it can be difficult to raise prices while still retaining customers later or Read more. appeared first on Information Matters.

IT 52

Your Team's Pragmatic Guide to Security

Speaker: Naresh Soni, CTO, Tsunami XR

The pandemic has led to new data vulnerabilities, and therefore new cybersecurity threats. As technology leaders, it's time to rethink some of your product security strategies. Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered.