Agari Report: New BEC scam 7X more costly than average, bigger phish start angling in
Sophisticated threat actors, evolving phishing tactics, and a $800,000 business email compromise (BEC) scam in the second half of 2020 all signal trouble ahead, according to analysis from the Agari Cyber Intelligence Division (ACID). After attacks on Magellan Health, GoDaddy, and the SolarWinds “hack of the decade,” one thing is distressingly clear. Phishing, BEC, and […]
5 Minutes With… Veriato’s Chris Gilkes
In the latest instalment of our IT security industry executive interview series we spoke to Chris Gilkes (pictured), Director EMEA at Veriato, about the company and its solutions, key challenges posed by a remote workforce, the importance of innovation and why you should never stop listening to customers… Tell us about your company, products and […]
WEBINAR: Solorigate/SUNBURST – Chronology of a supply chain nightmare
By SentinelOne and ReliaQuest SUNBURST was one of the most devastating cyberattacks in recent years and has sent shockwaves like no other attack before. Solorigate/SUNBURST impacted more than 420 of the Fortune 500 companies and thousands of government and commercial organizations. The attack on the ‘digital supply chain’ was uncovered in December 2020, although the […]
Cyber Threat Intelligence – Solutions Guide & Best Practices
By Digital Shadows Cyber threat intelligence (CTI) improves the resilience of your business against emerging cyber threats. The best CTI program informs preventative and proactive security actions and is intimately tied to business concerns and effective reduction of risk. This guide serves to: Navigate you through the jargon surrounding cyber threat intelligence Outline some of […]
Security IT Summit: Registration now open for June 2021
The Security IT Summit is a unique event that has been created to help you build business connections with the latest innovative and budget-saving suppliers in the industry. Date & Venue: 29th June – Hilton London Canary Wharf You can attend this one-day event entirely for FREE.BOOK YOUR PLACE HERE (Virtual attendance options are available) What does your free […]
WEBINAR REWIND: Ransomware Attack Simulation
In a special attack simulation, this Cybereason webinar looked at how multi-stage attack campaigns operate today – and you can now watch the entire session again online. Presented by Cybereason Product Director Eric Sun, the webinar enables the audience to witness an attacker’s infiltration and watch the malicious operation as it moves across the entire […]
WHITE PAPER: Active Directory security – AD monitoring and proactive security detection combined
“Active Directory security” generates a few different reactions, depending on who you ask. Get the new guide from Microsoft 17x MVP Derek Melber to discover: The attacker-shaped holes in common monitoring solutions The 8 key features to proactively secure AD How Alsid can strengthen your security posture Start reading the free guide
WEBINAR REWIND: Managing The Compliance & Security Nightmares Caused By A Remote Workforce
Don’t worry if you missed last week’s brilliant webinar from Veriato – You can now watch the entire session again online! In an in-depth and wide ranging talk, Veriato’s Director of EMEA Sales Director Chris Gilkes takes us through how your organisation can maintain compliance while employees are working remotely. Why is this important? Put […]
WHITE PAPER: Future-proofing endpoint management
By Quest New devices, platforms, applications, and technologies connecting to the network are overwhelming IT’s ability to manage endpoints across the enterprise. Adding to the complexity, many organizations have disparate systems or processes for managing desktop and mobile devices. This white paper examines endpoint management issues and reviews best practices for administering, managing and securing […]
What’s the average time to identify a security breach? 280 days, according to IBM’s 2020 Cost of a Data Breach report
By Accedian Today, it’s not a matter of “if”, but “when”, organizations operating in today’s digital world will be breached. But, once cyber criminals manage to get past the network perimeter, do you have the visibility to detect them and see what the bad actors are doing? In this guide, find out how next-generation Intrusion […]