New research spike in phishing attempts since the pandemic began, leading to more frequent successful attacks and a heavier burden on corporate IT security teams to remediate incidents.
Cybercrime campaigns and high-profile advanced persistent threat groups are shifting how they target victims and focusing more on intricate relationships with “secure syndicate” partnerships to disguise activity, according to the latest 2019 Cyber Threatscape Report from Accenture.
What happens online sometimes manifests as a real-world threat. Real-world threats are typically planned, referenced or originated online. Understanding the convergence between online behavior and real-world actions is increasingly important in the corporate security field. Here’s how security professionals can think about identifying and understanding threats in a society that increasingly straddles the virtual and physical worlds.
The relentless bombardment of cyber-attacks, and the fear of a breach and all that entails, have led to some rather dramatic changes in the Chief Information Security Officer position recently. It has long been considered the corporate hot seat, where job security is a misnomer and the average tenure is less than two years. That may still be true for many, but changes are happening that are finally allowing the CISO to emerge from the shadows of the IT department.
In the wake of many cybersecurity breaches, SEC's aggressive agenda demonstrates that cybersecurity management is vital to U.S. public companies and capital markets.
Enterprises will face nine major threats, including vulnerabilities in software and other applications, state-backed espionage with emerging technology and malware feats and manipulated machine learning, says Threat Horizon 2021 from the Information Security Forum (ISF).