cyber risk
Is DNS a vital component of your security strategy?
Security and risk (S&R) teams often use DNS to detect and block threats early in the kill chain, identify compromised devices, and investigate and respond to malware, an …
2020: The year of increased attack sophistication
There was an increase in both cyberattack volume and breaches during the past 12 months in the U.S. This has prompted increased investment in cyber defense, with U.S. …
Cyberwarfare: The changing role of force
Novel malware, computer code and clandestine digital access are some of the unconventional weapons various countries are currently amassing and deploying. Whether used as a …
In the age of disruption, comprehensive network visibility is key
IT teams require comprehensive visibility into the network driven by a number of factors, including tremendous disruption from the COVID-19 pandemic, relentless technological …
Tech businesses must rethink their IT infrastructure
Working life has changed drastically in recent months. Speedy digital transformation has been critical for business continuity and has been driving growth even during these …
DDoS traffic capitalizes on remote working connectivity reliance to disrupt service provider targets
In the first quarter of 2020, DDoS attacks rose more than 278% compared to Q1 2019 and more than 542% compared to the last quarter, according to Nexusguard. Working from home …
CIOs are apprehensive about interruptions due to expired machine identities
TLS certificates act as machine identities, safeguarding the flow of sensitive data to trusted machines. With the acceleration of digital transformation, the number of machine …
Ransomware attacks are increasing, do you have an emergency plan in place?
39% of organizations either have no ransomware emergency plan in place or are not aware if one exists. This is despite more ransomware attacks being recorded in the past 12 …
Organizations need an agile response to unexpected risks
The average $5 billion company incurs delays of roughly 5 weeks per year in new product launches due to missed risks, with a $99 million opportunity cost, according to …
Remote employees encounter 59 risky URLs per week
Working remotely from home has become a reality for millions of people around the world, putting pressure on IT and security teams to ensure that remote employees not only …
With remote working on the rise, infosec strategies need to evolve
The recent pandemic created a new normal that redefines the way business operates by eliminating security and physical work borders. An Avertium study found that having …
Core cybersecurity principles for new companies and products
The rapid increase in cyberattacks and pressures escalating from changes prompted by COVID-19 have shifted consumer behavior. The findings of a report by the World Economic …
Featured news
Resources
Don't miss
- European companies hit with effective DocuSign-themed phishing emails
- BeyondTrust fixes critical vulnerability in remote access, support solutions (CVE-2024-12356)
- CISO accountability: Navigating a landscape of responsibility
- Key steps to scaling automated compliance while maintaining security
- Vanir: Open-source security patch validation for Android