All cyber-attack articles – Page 2

  • Blog

    FBI cyber leader joins FTI Consulting


    FTI Consulting, a global business advisory firm, announced that Anthony Ferrante, former Director for Cyber Incident Response at the U.S. National Security Council and Supervisory Special Agent at the Federal Bureau of Investigation, has joined the firm’s Global Risk & Investigations Practice within its Forensic & Litigation Consulting segment as ...

  • Blog

    FBI: Cyber-criminals targeting protected health information


    The Federal Bureau of Investigation has issued a warning to medical and dental facilities: Cyber-criminals are actively targeting protected health information and personally identifiable information to intimidate, harass, and blackmail business owners.

  • Blog

    Resilient helps companies respond to cyber-attacks


    Resilient, an IBM company, released the industry’s first Dynamic Playbook for ransomware, aimed at helping organizations globally respond effectively to this growing type of cyber-attack.

  • DigitalManhattan

    New York’s new cyber-security demands draw near


    The Empire State is on track to impose a comprehensive slate of new cyber-security rules for banks and their vendors. More from Joe Mont.

  • Blog

    TrapX releases deception-based security solution


    TrapX, a deception-based cyber-security defense provider, recently released the world’s first deception-based security solution specifically designed to protect the Society for Worldwide Interbank Financial Telecommunication (SWIFT) financial networks.

  • Blog

    FinCEN wants cyber-attack data in SARs


    New guidance from the Financial Crimes Enforcement Network addresses the inclusion of information about both attempted and successful cyber-attacks in Suspicious Activity Reports.

  • Article

    Yahoo breach shows that boards may be their own worst enemy


    Yahoo’s recently disclosed breach of at least 500 million user accounts underscores the risks board members create for the companies they serve by using free e-mail services. More from Joe Mont.

  • Article

    Healthcare, ransomware, and effective cyber-security hygiene


    Imagine this: You’re a large healthcare provider whose staff is having trouble accessing vital records in your hospital’s computer network. Your IT department begins an immediate investigation and determines the cause to be a malware attack. Worse yet, the attackers are demanding ransom to obtain the decryption key. How do ...

  • PaymentCardCut

    Preventing a payment card hack


    Point of sales systems are the weak link in the chain when it comes to retail cyber-security. Recent data breaches at a number of prominent companies—including three in January alone—highlight the ever-increasing stakes for any organization responsible for handling customer data. Increasingly this is an issue that a strong compliance ...

  • Blog

    SafeBreach Arms Defenders With the Hacker's Playbook


    SafeBreach, a breach validation firm, last month officially announced the company and the general availability of its platform. Founded by former LivePerson CSO Guy Bejerano and renowned security researcher Itzik Kotler, SafeBreach enables any size organization to precisely and continuously quantify the risk of breaches from specific attack scenarios, harden ...

  • Blog

    Chubb Launches Cyber-Incident Response Partnership With Crawford & Company


    Property and casualty insurance company Chubb this week announced the launch of a new partnership with claims and crisis management provider Crawford & Company, as Chubb continues to invest in building its cyber enterprise risk management capabilities.