Wednesday, March 18, 2020

Coronavirus-themed cyberthreats likely to escalate -- and hinder response efforts

 
Security Digest
Information security news and advice from TechTarget's network |March 18, 2020
TechTarget
FEATURED STORY
Ransomware attacks poised to disrupt coronavirus response efforts

by Alexander Culafi, News Writer

Experts fear coronavirus-themed threats will escalate to ransomware attacks, and such attacks will disrupt response efforts at hospitals and city, state and local governments.

Advertisement
NEWS
 
Ransomware attack hits Champaign-Urbana Public Health District

A ransomware attack shut down Champaign-Urbana's public health website, hindering the city's ability to provide information and updates on the coronavirus pandemic.

 
Microsoft leads takedown of Necurs botnet

Microsoft, BitSight and other partners used legal and technical steps to take control of one of largest botnets in the world that infected more than 9 million systems.

EXPERT ADVICE
 
Risk management vs. risk assessment vs. risk analysis

Understanding risk is the first step to making informed budget and security decisions. Explore the differences between risk management vs. risk assessment vs. risk analysis.

 
How nation-state cyberattacks affect the future of infosec
Any company can be a nation-state cyberattack victim. Brush up on the latest and most common nation-state techniques and their implications on the threat landscape of tomorrow.
 
Updating the data discovery process in the age of CCPA
Privacy regulations are changing the enterprise data discovery process. Now, automation is key for fulfilling data discovery mandates, including those for CCPA and GDPR.
 
Analyzing the top 2019 data breach disclosures: Hindsight in 2020
Make 2020 the year your company keep its resolution to avoid a data breach. Experts offer lessons learned from the top 2019 data breaches to help stay secure in the year ahead.
 
5G network slicing security benefits IoT, mobile

The fifth generation of mobile cellular technology offers a unique benefit its predecessors don't: network slicing. Learn more about these virtual slices and their security benefits.

 
Symmetric vs. asymmetric encryption: Decipher the differences
Explore the differences between symmetric vs. asymmetric encryption algorithms, including common uses and examples of both, as well as their pros and cons.
 
ITOps security requires attention to training
Becoming fluent about IT security is critically important for numerous aspects of ITOps, yet many organizations fail to train their ITOps staff in security.
 
How privacy compliance rules will affect IT security
As companies scramble to comply with consumer data privacy compliance mandates, like GDPR, CCPA and others on the horizon, IT security will shoulder much of the process burden.
About This E-Newsletter
The Security Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2020 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: