Data Classification solutions help companies understand and manage their data, however, in this era of regulatory obligation, a "one-size-fits-all" solution doesn’t provide the granularity or flexibility needed to remain compliant.
What lessons are to be learned from the many cyber-attacks we hear about in the news? The advice from Mark Bell, Managing Director, Digital Defense by Fortra, is that companies shouldn’t lose hope.
Authorities say Ramon Abbas, aka Hushpuppi, perfected a simple internet scam and laundered millions of dollars. His past says a lot about digital swagger, and the kinds of stories that get told online.
The past year has seen major changes in business from the growth of the virtual company with employees working from home to an accelerated move to the cloud. How can enterprises secure their data in this rapidly changing environment? Fortra' Kate Bolseth answers our questions.
A survey from Agari revealed how cybercriminals exploit compromised accounts and stolen credentials. Around 50% of compromised accounts in phishing attacks are accessed within 12 hours.
Agari researchers entered unique credentials belonging to fake personas into phishing sites posing as widely used enterprise applications, and waited to see what the phishers would do next with the compromised accounts.
Almost two-thirds of all phished credentials are verified by attackers within a day and then used in a variety of schemes, including business email compromise and targeting other users with malicious code.
Agari has decided to carry out an experiment to better understand how these actors move, so they seeded over 8,000 phishing sites with credentials under its control to see what they do.