cyberattacks


Over the last couple of years, cyberattacks have evolved in both scale and effectiveness, affecting organizations across all industries and geographic regions. Successful cyberattacks are a growing industry-wide problem in spite of billions being spent on cybersecurity solutions. Part of the reason is that new techniques- and in fact a mature supporting cybercrime ecosystem- for penetration and evading detection have reduced the effectiveness of many traditional defenses. The lingering effects of a successful attack often have devastating consequences,... [Read More]
by RSS Michael Xie  |  Oct 17, 2017  |  Filed in: Business and Technology
Cybercriminals have increasingly taken notice of schools and universities as profitable targets for cyberattacks. A key reason for this is the types of information schools keep on students, parents, and staff. Typically, upon infiltrating an institution’s network, cybercriminals will probe for, find, and exfiltrate valuable user data. This could be anything from health records, financial information, or any other personally identifiable information, such as social security numbers. Cybercriminals typically then take this data and sell it... [Read More]
by RSS Susan Biddle  |  Oct 06, 2017  |  Filed in: Industry Trends
As cyberattacks become more frequent and impactful, security teams and executives across industries are taking notice. With new strains of malware being constantly reported, organizations want to make sure that their security solutions, and the vendors that provide them, are adapting to defend against this new normal. To ensure they have the capability to deal with these constantly evolving attacks, customers are turning to you, their solution providers, to answer their questions and ensure there is a structured strategy in place to deal with... [Read More]
by RSS Joseph Sykora  |  Sep 05, 2017  |  Filed in: Industry Trends
Deutsche Telekom's interactive, real-time map of global cyberattacks reveals the bulk of recent attacks -- 27.3 million in February alone -- were against the Server Message Block (SMB), aka the Common Internet File System (CIFS). Reuven Harrison, CTO and co-founder of Tufin, a security and lifecycle management company and Fortinet solution partner, wrote in a blog that the map's revelations are significant. This attack vector, he explains, operates across an application-layer network protocol mainly used to provide shared access to files, printers,... [Read More]
by RSS Stefanie Hoffman  |  Jul 30, 2012  |  Filed in: Industry Trends