IBM X-Force researchers monitor the activity of top cybercrime gangs on an ongoing basis. In a recent analysis of Ramnit Trojan targets, the team looked into the way the malware’s operators target e-commerce vendors in Japan — the gang’s active attack turf nowadays. As it turns out, Ramnit in Japan…
Read More
Let’s talk about the “people problem.” Cybersecurity defenses and cyberattack methods are evolving rapidly, but human beings, not so much. This is why nearly all cyberattacks are now based on exploiting human nature. This month, Proofpoint made the stunning claim that more than 99 percent of attacks observed by their…
Read More
The time has come to modernize your on-premises identity and access management (IAM) system. As organizations of all sizes and across industries move data and applications to the cloud, some — particularly those with sensitive financial and consumer data — still keep at least some of their IT infrastructure on…
Read More
It’s that time of year again — Oct. 1 marks the start of National Cyber Security Awareness Month (NCSAM). Now in its 16th year, NCSAM is designed to help enterprises and end users better address specific challenges and identify key opportunities for positive change. This year, the month-long messaging focuses…
Read More