strategy
Businesses need to stop thinking that ransomware is different from other attacks
Organizations are in danger of allowing the spectre of ransomware attacks to distract them from keeping up with general security measures, according to SE Labs. The company …
Most companies struggling to achieve observability despite investing in tools
A new study showed that two-thirds of organizations are currently spending $100,000 or more annually on observability tools, with 38% spending $300,000 or more annually. …
4 practical strategies for Log4j discovery
For security teams scrambling to secure their organizations against Log4j exploitation, one of the first and most challenging tasks is understanding where Log4j exists within …
Open-source software holds the key to solving Log4Shell-like problems
Earlier this month, the existence of a critical vulnerability in Apache Log4j 2 was revealed and a PoC for it published. Dubbed Log4Shell, it’s an issue in a logging library …
How confident can organizations be in their managed services security?
MITRE Engenuity and Cybersecurity Insiders announced the results of a research about the state of affairs in managed services security. The survey of IT security professionals …
Cybersecurity budgets surge, as skills gap wreaks havoc on 2022 plans
As enterprises plan and set budgets for the new year ahead, the vast majority are expecting to channel more dollars toward enhancing their cybersecurity efforts. Organizations …
The cybersecurity executive order is not all it’s cracked up to be
Seventy-two percent of federal cybersecurity leaders say the White House’s May 2021 Cybersecurity Executive Order (EO) addresses only a fraction of today’s cybersecurity …
Want to assemble a cyber Dream Team? Look back at the ‘92 Olympics
A common question I often receive from organizational leaders is how to assemble the right team that can ensure their enterprise is positioned to effectively combat the …
The impact of the Log4j vulnerability on OT networks
Operational Technology (OT) networks are at risk from the recently-announced Apache Log4j (CVE-2021-44228) vulnerability. On the surface, it is not clear why this should be. …
When done right, network segmentation brings rewards
96% of organizations claim to be implementing segmentation in their networks, yet only 2% of those organizations are segmenting all six mission-critical asset classes, …
Why are data professionals investing in data governance programs?
Precisely and Drexel University’s LeBow College of Business (LeBow) released findings from their data management survey. The report provides insights into the potential …
The cyber risk future doesn’t look good, but organizations are ready
A Trend Micro report predicts global organizations will emerge more alert and better prepared in 2022 thanks to a comprehensive, proactive, cloud-first approach to mitigating …
Featured news
Sponsored
Don't miss
- How to recognize employment fraud before it becomes a security issue
- Practical strategies to build an inclusive culture in cybersecurity
- Domain security posture of Forbes Global 2000 companies
- Faraway Russian hackers breached US organization via Wi-Fi
- Microsoft asks Windows Insiders to try out the controversial Recall feature