Week in review: MITRE ATT&CK v10 released, BEC scammers’ latest tricks, WFH security tactics
Here’s an overview of some of last week’s most interesting news, articles and interviews: Released: MITRE ATT&CK v10 MITRE Corporation has released the tenth …
Released: MITRE ATT&CK v10
MITRE Corporation has released the tenth version of ATT&CK, its globally accessible (and free!) knowledge base of cyber adversary tactics and techniques based on …
New infosec products of the week: October 22, 2021
Here’s a look at the most interesting product releases from the past week, featuring releases from SecLytics, SecurID, Splunk, ThreatConnect and ZeroFox. ThreatConnect …
CDR: The secret cybersecurity ingredient used by defense and intelligence agencies
It’s very rare that the defense and intelligence community is vulnerable to file-based attacks. After all, for these organizations security is not a business case, it’s a case …
Embracing secure hybrid work with four foundational IT controls
Hybrid work has become the norm for many businesses. In fact, a 2021 survey conducted by HR consulting firm Mercer found that out of a group of 510 employers with flexible …
Security changes needed to protect corporate networks from non-business IoT devices
Cyber adversaries know that one small IoT sensor can provide entry into a corporate network to launch ransomware attacks and more. According to a survey of IT decision-makers …
Fraud detection and prevention market size to reach $62.7 billion by 2028
The global fraud detection and prevention market size is expected to reach $62.7 billion by 2028, registering a CAGR of 15.4%, according to ResearchAndMarkets. Rise in …
Tech support scams becoming the top phishing threat to consumers
NortonLifeLock published a report detailing the top consumer cybersecurity insights and takeaways from July to September 2021. The latest findings show tech support scams, …
Business composability: Mastering the risk of accelerating change and creating new business value
Enterprises must embrace business composability to thrive through disruption in 2022 and beyond, according to Gartner’s survey of CIOs and technology executives. Business …
Fraud never sleeps: Why biometrics is essential for effective fraud prevention
When the pandemic forced organizations to send customer service agents to work from home, fraudsters quickly seized the new opportunity presented by isolated employees. Social …
Smartphone counterespionage for travelers
If you’re traveling abroad on business, there’s a good chance you’ll need to bring along a smartphone to get around, meet up with associates or learn about the idiosyncrasies …
How do I select a GRC solution for my business?
Selecting a governance, risk and compliance (GRC) solution can be very challenging. It must cover all three practices it stands for, without exception, which can sometimes be …
Featured news
Resources
Don't miss
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?