Library
A new data protection framework for the whole of the European Union seeks to create a harmonised regulation that is fit for purpose in today’s fast-moving IT, data and compliance landscape. Yet despite the fact that the proposed new rules will be implemented on 25th May 2018, IT professionals are worryingly unprepared for the change.
-
- Download
One way cybercriminals obtain the resources and connections they need to engage in their activities is through the Internet underground or “dark web.” Definitions of the Internet underground may vary, but to Secureworks, it means the collection of Internet forums, digital shop fronts and chat rooms that cybercriminals use to form alliances, trade tools and techniques, and sell compromised data that can include banking details, personally identifiable information and other content.
-
MM
Last year, over $80 billion was spent on cyber security, yet two-thirds of organisations were still breached. The reason? 81% of data breaches involved weak, default or stolen passwords.
It seems that no matter what we do, there will always be a new strain of malware designed to give CISOs grief. It might be called Wanna Cry, Pytra or any of thousand different names but malware keeps evolving for a simple reason — it works.
Is your email system offering an easy route into your network for Ransomware?
Your email system is usually your weakest point of entry for ransomware attackers with 98% of phishing malware entering via email. How can you close this backdoor to your systems and avoid becoming a victim? Listen to our webinar to identify your weakspots – and discover how to strengthen them.
It is no exaggeration that enterprises can run in average 25 security products concurrently, as it is the case with financial services organisations, according to research firm Ovum. And yet sometimes, 25 products can be as good as zero.
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence