Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
Advanced Persistent Threat (APT) intrusions are sophisticated cyber-attacks carried out by well-funded and organized cyber-criminals, nation state actors or, more recently, a combination of both. The attacks are designed to establish persistence using various tactics, techniques and procedures (TTPs) that are intended to avoid detection and mimic authorized activity in the environment, known as “living off the land.” APTs’ goals may include the acquisition of intellectual property, personal data and financial information or the compromise of infrastructure or specialized data. APT intrusions often result in the unauthorized actor achieving part or all of their objective and can lead to serious reputation and financial damage to a company.
*May exclude premium content
By Kenya Parrish-Dixon
By the time you read this, Americans will have been working from home for more than three months. This has never happened before in this country during the age of technology. As millions logged on to their home networks and personal devices in an attempt to keep their companies afloat, cybersecurity issues rose to the forefront of the many issues that companies had to manage.
By Mike Hamilton
The biggest challenge with any legal hold process is ensuring that potentially relevant data is actually preserved. But with evolving requirements for how data is managed by new data privacy laws like the CCPA and the GDPR, it’s become harder to secure data by simply sending a legal hold and assuming the custodian will do their duty to preserve it.
By Ryan Drimalla and Karl Dorwart
The London Interbank Offered Rate has long been the global basis for agreements that include a variable interest rate component. However, LIBOR would be replaced by other benchmarks by the end of 2021. Key to assessing risk of exposure, quantifying the financial impact, developing remediation plans and communicating material information to stakeholders will be the identification, analysis and remediation of LIBOR-based contracts.
By Tomas Suros
As the current pandemic has forced much of the world into virtual workforce mode, cybercriminals have seized on the uncertainty of the current times to launch new and creative offensives. Fears surrounding COVID-19 are high, conspiracy theories are running rampant, and cyberattackers are counting on stress and distraction to decrease our vigilance against intrusions.