Even as investigators began to suspect the new strain was more of a wiper designed for data destruction, Microsoft was demonstrating a new Controlled folder access feature designed to enforce application whitelists.
An important part of responding to cybersecurity attacks is to have an effective incident response plan in place. Otherwise, it’s easy to end up languishing in inactivity – as with the two out of three merchants that fail to change their fraud prevention strategies even after suffering a data breach.
One team of security researchers was working on a way to secure enterprise content management systems without patching, while others were more focused on advising security executives on how to spot and prevent insider threats.
Such threats are part of a broader threat climate in which IT and security personnel are put in a no-win situation – and the situation is only going to get more challenging as new regulations, such as the EU’s GDPR, kick in next year. Make sure you’re already working on compliance to ensure you don’t get caught flat-footed.
- Breach costs down but slow forensics still threaten Australian companies’ regulatory compliance
- The week in security: GDPR’s “existential threat” to Australian companies
- As poor vulnerability management threatens the business, time really is money
- AI-driven virtual security analysts could help close security’s skills gap