In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
In this white paper, discover an outline of how you can methodically assess and structure enterprise security to protect your data and address compliance mandates such as HIPPA, PCI DSS, SOX, as well as NIST SP-800-171 if appropriate, by applying a NIST-based approach to your IT environment.
Changing identity governance vendors can be a difficult decision. But some situations make it almost mandatory to change identity governance vendors. At the end of the day, this is a business decision based on the facts. In this white paper, explore 7 situations which would warrant you to change your identity vendor.
This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
IAM security policies must take into account the latest technology developments, especially cloud and the Internet of Things. Access this three-part technical guide to gain valuable information on IAM strategy in the face of rapidly evolving technology.
The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.
This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.