Leveraging threat intelligence to tackle supply chain vulnerabilities
In this interview with Help Net Security, Brandon Hoffman, CISO at Intel 471, talks about the growing threat of supply chain attacks, the most common supply chain …
Enterprise security challenges and increased cloud usage fueled by remote work
81% of U.S.-based IT professionals believe that having remote workers has increased enterprise security challenges, while 74% acknowledge that their company’s use of cloud …
3 ways any company can guard against insider threats this October
October is Cybersecurity Awareness Month, but most business leaders and consumers don’t need a special event to remember cybersecurity’s preeminence in today’s turbulent …
A multi-party data breach creates 26x the financial damage of single-party breach
Cyentia Institute and RiskRecon released a research that quantifies how a multi-party data breach impacts many organizations in today’s interconnected digital world. The study …
The evolution of DRaaS
The shift of daily production workloads from on-premises to cloud has also impacted approaches to protection of business assets and operations. When it comes to protecting …
U.S. Department of the Treasury announces set of actions to counter ransomware
As part of the whole-of-government effort to counter ransomware, the U.S. Department of the Treasury announced a set of actions focused on disrupting criminal networks and …
DDoS attacks increased 11% in 1H 2021, fueling a global security crisis
NETSCOUT announced findings from its report that underscore the dramatic impact cyberattacks continue to have on private and public organizations and governments worldwide. In …
2 million malicious emails bypassed secure email gateways in 12 months
Two million malicious emails bypassed traditional email defenses, like secure email gateways, between July 2020-July 2021, according to data from Tessian. Who’s being targeted …
Microsoft Power Apps data exposure: Prioritizing sensitive data with secure configuration settings
Security misconfigurations are one of the most common gaps hackers look to exploit. One bad configuration setting in a popular cloud platform can have far-reaching …
77% of execs concerned about security tools gaps in their company
77% of Americans believe their company has gaps in its current security tools, according to Lynx Software survey findings. 500 Americans in managerial and executive roles were …
Ransomware still a primary threat as cybercriminals evolve tactics
Trend Micro announced that it blocked 40.9 billion email threats, malicious files, and malicious URLs for customers in the first half of 2021, a 47% year-on-year increase. …
Tech pros reporting a positive perception of their roles, looking forward to what lies ahead
Amidst ongoing pandemic-driven change at work and at home, a SolarWinds survey seeks to understand how tech pros feel about their daily roles and responsibilities, the lessons …