For nearly 70 years, Village Roadshow has been entertaining moviegoers, theme park visitors and many other customers. For these creative collaborators, keeping the lines of communications up—while keeping risk down—is central to business.
This case study talks about the three primary business risks that Village...
Software continues to run the modern enterprise, and while it has the potential to drive innovation it can also introduce vulnerability. Rapid release cycles often prioritize features over security and hackers are adapting their tactics to target distributed software applications that are increasingly...
Information Security Media Group's Fraud, Security and Risk Management Summit brought together a diverse group of cybersecurity leaders and experts in New York City for a comprehensive day of education and collaboration on payment fraud, identity theft and third-party risk management.
A coalition of cyber insurance associations has pledged to back fresh government cybersecurity guidance designed to help victims avoid ever paying a ransom as part of an ongoing push to reduce ransomware's profitability for criminals, in part by improving organizations' resilience and recovery.
In the past year, generative AI made groundbreaking strides in understanding and generating human-like text. User-friendly tools like ChatGPT quickly gained popularity, allowing modern businesses to streamline operations like never before. Unfortunately, access to generative AI has also empowered cybercriminals to...
Email is a major entry point for threat actors, who have evolved their tactics to bypass traditional security solutions and now leverage AI to make attacks more scalable and harder to detect. In response, organizations are buying AI-enabled solutions to bolster their security posture. Download The Role of AI in Email...
Time and time again, cybercriminals have demonstrated their impressive ability to identify new ways to leverage everyday communication tools as mechanisms for deceiving employees.
The newest example of this exploitative expertise? QR code attacks.
In our latest email threat report, Abnormal researchers dive into QR...
The advent of generative AI has transformed the way modern organizations operate. While many business users are adopting tools like ChatGPT and Google Bard to enhance productivity, cybercriminals are also capitalizing on this technology—resulting in more attacks with increased sophistication.
To understand how...
The cyber threat landscape is projected to undergo significant transformation in the coming year, characterized by the emergence of novel and refined threat vectors as well as a resurgence of traditional attack methods.
Advancements in technology have provided malicious actors with an extensive toolkit to exploit...
Compromised mobile apps can be an open door to critical
enterprise app servers and other back-end systems,
and this survey aims to shine a light on a potential hole in
most enterprise security walls – exposing potential gaps in
CISO awareness.
Compromised mobile apps can be an open door to critical enterprise app servers and other back-end systems, and this survey aims to shine a light on a potential hole in most enterprise security walls – exposing potential gaps in CISO awareness.
In Q2 & Q3 2023, ISMG surveyed over 100 senior cybersecurity...
Researchers discovered an undocumented backdoor being used by the North Korean Lazarus Group to target a Spanish aerospace company. The attacker masqueraded as a Meta recruiter and tricked the victim into downloading and executing malicious files on a company device.
Vice President at Appgate, Mike Lopez, offers his expert analysis on the survey findings and how this year's results were unique to the most current cyber threats.
Welcome to our report summarizing the 2023 Faces of Fraud survey. We are most grateful to our 150+ industry contributors who answered our questions frankly to enable us to provide a snapshot of the frauds causing most concern for financial services in 2023.
The data shared in this report, as well as expert...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.