Wednesday, October 4, 2017

New ransomware attacks show increased sophistication, higher risks

Security Digest
Information security news and advice from TechTarget's network |October 4, 2017
TechTarget
FEATURED STORY
Ransomware attackers using more sophisticated techniques
by Rob Wright, Executive Editor

At the (ISC)2 Security Congress, infosec professionals warned of sophisticated ransomware attackers that are using more advanced techniques to encrypt entire networks. (SearchSecurity.com)

Advertisement
NEWS
 
DHS cyberinsurance research could improve security

A longitudinal cyberinsurance study performed by the Department of Homeland Security could improve enterprise security but the effects depend on the data collected, said experts. (SearchSecurity.com)

 
Government data requests on the rise for Apple and Google

One expert is concerned about the large increase of government data requests received by Apple and the effects this surveillance activity has on user privacy. (SearchSecurity.com)

 
Deloitte hack compromised sensitive emails, client data
News roundup: During the Deloitte hack, attackers had access to client data and internal email servers. Plus, the U.S. asks China not to enforce its Cybersecurity Law, and more. (SearchSecurity.com)
 
 
 

Proof-of-concept iOS exploit released by Google's Project Zero

Google's Project Zero released a proof-of-concept iOS exploit similar to the Broadpwn Wi-Fi flaw that could allow an attacker to run code or implant a backdoor. (SearchSecurity.com)

 
Network lateral movement from an attacker's perspective
A security researcher describes the network lateral movement process from an attacker's perspective and a few key points of focus for IT pros, at DerbyCon. (SearchSecurity.com)
 
Risk & Repeat: Kaspersky ban turns ugly
In this week's 'Risk & Repeat' podcast, SearchSecurity editors discuss the U.S. government's Kaspersky ban and how competitors like McAfee are trying to capitalize on it. (SearchSecurity.com)
 
 
 
EXPERT ADVICE
 
What a data protection officer can offer enterprises subject to GDPR

The EU GDPR requires that organizations appoint a data protection officer, but is that really necessary for security? Expert Francoise Gilbert examines the compliance requirement. (SearchSecurity.com)

 
How to manage control inheritance in a hybrid cloud environment
Effective management of access control inheritance is important in a hybrid cloud environment. Expert Ravila White explains the challenges involved and how to overcome them. (SearchCloudSecurity.com)
 
 
 
 

Understanding data manipulation threats in enterprise security

When it comes to protecting data, ransomware isn't the only thing that should worry enterprises. Nick Lewis explains the threat of data manipulation attacks and how to stop them. (SearchSecurity.com)

 
How can peer group analysis address malicious apps?

Google is using machine learning and peer group analysis to protect against malicious Android apps in the Google Play Store. Matt Pascucci explains how this works. (SearchSecurity.com)

 
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved.
TechTarget

No comments: