Sophisticated spear phishing attacks becoming more common

February 10, 2016

Spear phishers continue to pierce even well-defended networks, causing grave financial wounds. Spear phishers lure a specific individual to click on a viral email attachment or to navigate to a corrupted Web page. Malicious code typically gets embedded on the victim’s computing device, giving control to the attacker.

Spotlight

Secure Decisions

Secure Decisions is a leader in cyber security situational awareness, with an established track record of R&D contracts, technology transition and product development. Our core competencies include decision analysis, network visualization, visual analytics for software security, cyber event impact analysis, mission assurance, and computer network defense training. Our user-centered design approach presents complex information in a visual environment enabling users to comprehend and interact with their information in ways that are reflective of how they work, and how they view the world. Secure Decisions’ current products and research include wireless security, visualization of network activity, tools for secure software development, innovative methods for network defense training, and safe computing education.

Other Infographics
news image

Infographic: What’s next in AI-powered cyber response?

Infographic | July 13, 2021

AI has been touted to be a game-changer for cybersecurity. It can analyse threats; rapidly detect anomalies; and filter through the thousands of security alerts organisations receive in a day. Singapore is already planning on using AI to secure its 5G networks. But AI is a resource, not a replacement. It has to be supported by the intuition of well-trained security analysts, automation, and a consolidated view of the organisation’s IT environment. Cybersecurity experts from Tanium break down how AI is speeding up cyber response, and how organisations can make the most of the tech.

Read More
news image

Alarming Cyber Security Stats to Know in 2022

Infographic | June 29, 2022

Attackers use multiple tactics to get access to your credentials and among those phishing is the most commonly used method. Every 9 out of 10 cyber-attacks start with a phishing email and end up costing millions of dollars to the organizations.

Read More
news image

Necessity of a Data Loss Prevention Strategy for Businesses

Infographic | February 9, 2022

A Data Loss Prevention (DLP) strategy is essential to protect sensitive data. Data loss prevention tools and software are designed to constantly monitor and filter data in real-time. In addition to dealing with the data being used, stored and transmitted within the network, data loss prevention applications ensure no harmful outside data is entering the company network.

Read More
news image

Data Loss Prevention Best Practices

Infographic | March 16, 2022

Every organization, regardless of size or industry, needs a data loss prevention (DLP) strategy to prevent data from being improperly accessed or deleted.

Read More
news image

10 Tips to Protect Your Data

Infographic | July 30, 2021

When making an online purchase, or creating an account online, it is tempting to save banking details and passwords for the sake of convenience. But a data leak from even one of these sources could cost you.

Read More
news image

Privileged Access Management (PAM)

Infographic | April 4, 2022

Privileged access management (PAM) controls, monitors, secures and audits all human and non-human identities and activities across an enterprise IT environment.3% of organizations lack a mature approach to access management, resulting in two times more breaches.

Read More

Spotlight

Secure Decisions

Secure Decisions is a leader in cyber security situational awareness, with an established track record of R&D contracts, technology transition and product development. Our core competencies include decision analysis, network visualization, visual analytics for software security, cyber event impact analysis, mission assurance, and computer network defense training. Our user-centered design approach presents complex information in a visual environment enabling users to comprehend and interact with their information in ways that are reflective of how they work, and how they view the world. Secure Decisions’ current products and research include wireless security, visualization of network activity, tools for secure software development, innovative methods for network defense training, and safe computing education.

Events