Research

To Guard Against Cybercrime, Follow the Money (Harvard Business Review)

Email attacks are cheap, easy, low risk, and high reward. No wonder a “malicious email is the cyber spy’s favored way in.” An email security breach could impact your organiza... More

Protecting Your Organization from Ransomware (Avanade Insights)

Ransomware has been making big news in the last week.  The cruel reality of the global ransomware attack that crippled computer systems in 150 countries is that the attackers took... More

Why Understanding, Control Should Be Key Parts of Your Cybersecurity Portfolio (Forbes)

Lately, I’ve been paying particular attention to the concept of having a cybersecurity portfolio. It’s a view that looks at the need for enterprise-grade cybersecurity from a ... More

10 Ways to Protect Your Windows Computers Against Ransomware (TechRepublic)

Malware has been around for decades now. And as our reliance on computing systems has grown, so too has malware proliferation. While antivirus applications were once the key elemen... More

The Best Digital Offense Starts With the Best Security Defense (Cisco)

We have been talking about digitization for a while now, and the fact that it's disrupting every industry. But, the conversation has shifted. Companies no longer debate whether or ... More

Five Security Lessons WannaCry Taught Us the Hard Way (Dark Reading)

The scope and severity of the fallout from the WannaCry attacks elicits plenty of "we told you so" head shakes about the dangers of ransomware. With a lightning-fast speed, the bla... More

Not Investing in Cybersecurity Has ‘Inverse ROI’ (TechTarget)

If the cyberattacks that infected computers in more than 150 countries this month did anything good, they have shown organizations the world over what not keeping systems up to dat... More

FBI Offers Updated Business Email Compromise Warning, Stats (IC3)

Business E-mail Compromise (BEC) is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payme... More

Competing Claims of Security Vendors Sow Customer Distrust (Security Intelligence)

Exploits, data breaches and ransomware campaigns are succeeding despite increased public awareness about these threats. New victims are found, old targets are rediscovered and peop... More

What We Learned from Verizon’s 2017 Data Breach Investigation Report (ITSP Magazine)

Verizon has released its 10th annual Data Breach Investigations Report (DBIR), a comprehensive and multi-faceted look-back on breach trends, threat actor tactics and apparent motiv... More

Cyber Espionage, Ransomware Attacks on the Rise (Verizon Enterprise Solutions)

Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report. Much of t... More

ISSA-LA Information Security Summit Set for May 18-19 in L.A. (ISSA-LA)

More than 1,000 people are expected to attend the May 18-19 ISSA-LA Information Security Summit at the Universal City Hilton in Los Angeles, with IT and InfoSec executives, leaders... More

Best Defense Against Ransomware is Aggressive Offense (ITSP Magazine)

Ransomware is big money. In fact, according to the Federal Bureau of Investigation, ransomware attackers collected more than $209 million from victims in the first three months of ... More

NAB 2017: Watermarking, Securing Data and Protecting Broadcasts: A Preview of CDSA’s NAB Cybersecurity Program

The Content Delivery and Security Association (CDSA) kicks off its three-day “Cyber Security and Content Protection Pavilion” (C3830CS at the Las Vegas Convention Center) prog... More

Swimming in Security Data Without Drowning (IBM’s Security Intelligence)

How much information do you need to manage your security? Until recently, the answer was always “more.” That is changing as the sheer volume of available data grows. Today, co... More

NSS Labs Announces Web Application Firewall Group Test Results

NSS Labs has announced the results of its second Web Application Firewall (WAF) Group Test. A growing segment of the security market, WAFs employ a wide range of functions to work... More

10 Cybersecurity Myths That Must Be Busted (In Homeland Security)

Cybersecurity was huge in 2016. From ransomware to weaponized Internet of Things (IoT) devices to foreign hacking of elections – last year saw it all. But many of these threats a... More

IT Leaders Share How They Quell Cybersecurity Attacks (CIO)

Ask CIOs and CISOs what cybersecurity fears keep them up at night and you’ll hear a range of responses -- from social engineering hacks such as phishing, as well as malware that ... More

Why Continuous Vulnerability Assessment is Essential (Bank Info Security)

A continuous vulnerability assessment program should be baseline security requirement for all organizations, says Richard Bussiere, principal architect, APAC, at Tenable Network ... More

Pew Research: Cybersecurity Knowledge Quiz (Pew Research Center)

Test your knowledge on cybersecurity topics and terms by taking our 10-question quiz. Then see how you did in comparison with a nationally representative group of 1,055 randomly se... More