cyber risk
Ransomware attacks: The power of adaptation
The pandemic has had a major impact on almost every aspect of our society and left many organizations susceptible to increasingly sophisticated ransomware attacks. In this …
Securing your WordPress website against ransomware attacks
It’s no surprise to anyone who works in security that there’s been an explosion in ransomware incidents over the last two years, costing companies across various industries …
The age of AI-powered devices at the edge
The vast amount of data constantly collected by the billions of sensors and devices that make up the IoT can pose a serious processing challenge for businesses that rely on …
Out with the old, in with the new: From VPNs to ZTNA
The VPN held an important role in the evolution of the internet, and for decades has supported businesses in securing their networks. VPNs have been used by businesses and …
Critical infrastructure today: Complex challenges and rising threats
Cyber attacks against critical national infrastructure are escalating. The ransomware hit on Colonial Pipeline was a clanging wake-up call for the public, but cybersecurity …
Previous employees with access to corporate data remain a threat to businesses
Offboarding employees securely is a key problem for business leaders, with 40% concerned that employees who leave a company retain knowledge of passwords that grant access to …
The cybersecurity of industrial companies remains low, potential damage can be severe
Positive Technologies released a research that examines information security risks present in industrial companies, the second-most targeted sector by cybercriminals in 2020. …
The cybersecurity metrics required to make Biden’s Executive Order impactful
For too long, both the private and public sectors have not prioritized cybersecurity efforts enough and only acted in “good faith” – an inadequate effort to improve …
Getting ahead of a major blind spot for CISOs: Third-party risk
For many CISOs and security leaders, it was not long ago that their remit focused on the networks and digital ecosystems for their organization alone. In today’s digital …
Hybrid work is here to stay, but security concerns are high
As a rise in variants spurs new uncertainties around the COVID-19 pandemic, businesses around the globe are tasked with developing a long-term plan and work model, whether …
File upload security best practices rarely implemented to protect web applications
Despite a marked increase in concerns around malware attacks and third-party risk, only 8% of organizations with web applications for file uploads have fully implemented the …
Checking for misconfigurations isn’t enough
Misconfiguration errors are often the main focus of security for cloud-native applications, and for good reason. Earlier this year, Hobby Lobby accidentally exposed 136 GB of …
Featured news
Resources
Don't miss
- European companies hit with effective DocuSign-themed phishing emails
- BeyondTrust fixes critical vulnerability in remote access, support solutions (CVE-2024-12356)
- CISO accountability: Navigating a landscape of responsibility
- Key steps to scaling automated compliance while maintaining security
- Vanir: Open-source security patch validation for Android