All cyber-attack articles – Page 2
-
Blog
FBI cyber leader joins FTI Consulting
FTI Consulting, a global business advisory firm, announced that Anthony Ferrante, former Director for Cyber Incident Response at the U.S. National Security Council and Supervisory Special Agent at the Federal Bureau of Investigation, has joined the firm’s Global Risk & Investigations Practice within its Forensic & Litigation Consulting segment as ...
-
Blog
FBI: Cyber-criminals targeting protected health information
The Federal Bureau of Investigation has issued a warning to medical and dental facilities: Cyber-criminals are actively targeting protected health information and personally identifiable information to intimidate, harass, and blackmail business owners.
-
Blog
Resilient helps companies respond to cyber-attacks
Resilient, an IBM company, released the industry’s first Dynamic Playbook for ransomware, aimed at helping organizations globally respond effectively to this growing type of cyber-attack.
-
Article
New York’s new cyber-security demands draw near
The Empire State is on track to impose a comprehensive slate of new cyber-security rules for banks and their vendors. More from Joe Mont.
-
Blog
TrapX releases deception-based security solution
TrapX, a deception-based cyber-security defense provider, recently released the world’s first deception-based security solution specifically designed to protect the Society for Worldwide Interbank Financial Telecommunication (SWIFT) financial networks.
-
Blog
FinCEN wants cyber-attack data in SARs
New guidance from the Financial Crimes Enforcement Network addresses the inclusion of information about both attempted and successful cyber-attacks in Suspicious Activity Reports.
-
Article
Yahoo breach shows that boards may be their own worst enemy
Yahoo’s recently disclosed breach of at least 500 million user accounts underscores the risks board members create for the companies they serve by using free e-mail services. More from Joe Mont.
-
Article
Healthcare, ransomware, and effective cyber-security hygiene
Imagine this: You’re a large healthcare provider whose staff is having trouble accessing vital records in your hospital’s computer network. Your IT department begins an immediate investigation and determines the cause to be a malware attack. Worse yet, the attackers are demanding ransom to obtain the decryption key. How do ...
-
Article
Preventing a payment card hack
Point of sales systems are the weak link in the chain when it comes to retail cyber-security. Recent data breaches at a number of prominent companies—including three in January alone—highlight the ever-increasing stakes for any organization responsible for handling customer data. Increasingly this is an issue that a strong compliance ...
-
Blog
SafeBreach Arms Defenders With the Hacker's Playbook
SafeBreach, a breach validation firm, last month officially announced the company and the general availability of its platform. Founded by former LivePerson CSO Guy Bejerano and renowned security researcher Itzik Kotler, SafeBreach enables any size organization to precisely and continuously quantify the risk of breaches from specific attack scenarios, harden ...
-
Blog
Chubb Launches Cyber-Incident Response Partnership With Crawford & Company
Property and casualty insurance company Chubb this week announced the launch of a new partnership with claims and crisis management provider Crawford & Company, as Chubb continues to invest in building its cyber enterprise risk management capabilities.
- Previous Page
- Page1
- Page2
- Next Page