With deep national security implications, the cyber risks associated with the Defense Industrial Base (DIB) are perhaps the most urgent. Threat actors have realized that targeting vulnerable companies across the defense supply chain can be not only a profitable enterprise but also an alternate method to accessing...
Cybersecurity experts have been
and remain concerned about a potential attack on the U.S.
election infrastructure. With Russian interference
in the 2016 elections, the U.S. Department of Homeland Security (DHS)
Cybersecurity and Infrastructure Security Agency
(CISA) undertook the mission to ensure free and...
Recent years have seen
firms in electricity generation and distribution, oil, and gas facing increasingly sophisticated
cybersecurity attacks. And the stakes in the energy sector are significantly high.
In May 2021, a cyber attack hit Colonial Pipeline1, and though the attack targeted the company’s
In 2020, reports indicated that cyberattacks on the healthcare industry more than doubled from 2019, with
ransomware accounting for 28 percent of all attacks. Unlike previous attacks focused
primarily on providers, the COVID-19 pandemic
exposed vulnerabilities in the entire healthcare sector.
In looking ahead to fraud transformation in 2022, it is good to
review where the conversation about 2021 began: with statistics
about perceptions and reality.
More than just survey results, this report offers expert analysis on
how to balance the competing priorities of business, customer and
compliance needs –...
The 2021 Cybersecurity Complexity Study was conducted in the summer of 2021. Focused on EU & UK enterprises, the survey
received more than 200 responses from organisations primarily in professional services (37%)
and financial services (32%), but also in retail, utilities and manufacturing, mainly with...
For fraudsters, there has been no respite. The fraud
economy took no pandemic hit. There was no
reduction in schemes among adversaries and they
experienced no job losses. Instead, shifts toward an increased dependency on digital channels have presented a myriad of new opportunities for illicit
Since Bitcoin’s launch in 2009, cryptocurrency has created new markets, spurred advancements in financial infrastructure, and driven innovative thinking in how to meet the world’s economic needs. But how can new entrants identify opportunities and manage risks in this emerging industry?
It all starts with...
Is cryptocurrency on your radar? If not, it should be.
As interest in cryptocurrency grows, we’ve not only seen an influx of institutional investment, but also new cryptocurrency services launched by traditional financial institutions. However, many FIs remain on the sidelines, perhaps unsure of how to get...
Average ransomware payments have increased by 450% since 2019. What are you doing to protect your organization from potential threats?
Ransomware was the biggest cybercrime story of 2020, with victim payments more than quadrupling over the previous year’s totals. And so far in 2021, ransomware attacks have yet to...
If the process of building a cohesive security plan seems daunting, or there just isn’t enough time, expertise or resources to complete the project yourself, help is here for building, maintaining and continuously evolving your cybersecurity program to meet current and future challenges.
Download this whitepaper...
Although Identity Access Management [IAM] is often considered a security and compliance function, a mature IAM program can also deliver many business benefits to your organization including reduced operational costs, improved user experience, improved user productivity, and reduced risk.
Download this whitepaper...
Have you noticed that there's a cultural gap between software developers and application security practitioners? This gap can challenge application security maturation within the Software Development Lifecycle (SDLC).
We'll examine how you can stimulate cultural change to mature your software development group,...
A compromised identity and its associated shared accounts are the single most
effective attack vector for a threat actor to compromise an entire multicloud
Download this whitepaper to learn how to protect your entire cloud environment, including:
Restricting the privileges any user, application,...
DevOps-driven adoption of new
technologies and processes
may mean security is an afterthought
and can expose new
gaps in security coverage and
Download this whitepaper which provides an overview of what DevSecOps is and how organizations can adopt its
practices in conjunction with technologies...