March 25, 2019
Via: Hot for SecurityInternet users are increasingly distrustful when it comes to big companies collecting and selling their private data to advertisers and others. At the same time, nearly half of customers feel disarmed, or powerless, with regards to these practices. Consumers have […]
March 18, 2019
Via: Help Net SecurityIn the past year or so, many cybercriminals have turned to cryptojacking as an easier and more low-key approach for “earning” money. While the value of cryptocurrencies like Bitcoin and Monero has been declining for a while now and Coinhive, […]
March 1, 2019
Via: Help Net SecurityOne shift in attacks that businesses should be aware of is the rapid growth of cryptocurrency mining, which increased 237 percent, according to the 2018 Security Roundup Report by Trend Micro. Overall, attacks that capitalize on the human desire to […]
Application security, Cloud security
February 7, 2019
Via: Security IntelligenceMany organizations have such a positive first experience with cloud computing that they quickly want to move to a hybrid cloud environment with data and workloads shared between private and public clouds. The flexibility and control that a hybrid cloud […]
January 21, 2019
Via: Help Net SecurityCompanies globally could incur $5.2 trillion in additional costs and lost revenue over the next five years due to cyberattacks, as dependency on complex internet-enabled business models outpaces the ability to introduce adequate safeguards that protect critical assets, according to […]
January 16, 2019
Via: Help Net SecurityRadware has released its 2018-2019 Global Application and Network Security Report, in which survey respondents estimate the average cost of a cyberattack at $1.1M. For those organizations that calculate (versus estimate) the cost of an attack, that number increases to […]
Application security, Network security
January 15, 2019
Via: Help Net SecurityWith one year to go until Microsoft ends support for its ten-year-old operating system Windows 7, as many as 43% of enterprises are still running the outdated platform. Kollective’s research found that nearly a fifth (17%) of IT departments don’t […]
December 24, 2018
Via: Dark ReadingPeter Drucker, aka the founder of modern management, is credited with writing, “If you can’t measure it, you can’t improve it.” Over time, that has been broadened to, “If you can’t measure it, you can’t manage it,” a statement that […]
December 18, 2018
Via: Dark ReadingLarge companies are leaving easy-to-exploit systems exposed on the public Internet, raising the risk of a serious future compromise, according to data from two cybersecurity firms. Rapid7 found that the average Fortune 500 firm had approximately 500 servers and devices […]
December 17, 2018
Via: Security IntelligenceThere are so many delegated operations in any business — finance, legal, physical plant functions, etc. — that any number of them can be easily overlooked. Without checking over every minute detail, the overall business appears to function with minimal […]
December 14, 2018
Via: Help Net SecurityA study conducted by Ponemon Institute found that 60 percent of organizations globally had suffered two or more business-disrupting cyber events — defined as cyber attacks causing data breaches or significant disruption and downtime to business operations, plant and operational […]
Cloud security, Network security
December 3, 2018
Via: Help Net SecurityWith organizations moving to the cloud and remote workers becoming the rule rather than the exception, the definition of the network is changing. Add to this the increasing use of IoT devices, encryption and engagement in shadow IT practices, and […]
November 29, 2018
Via: Help Net SecurityThe increased affordability and accessibility of data storage over recent years can be both a benefit and a challenge for businesses. While the ability to stockpile huge volumes and varieties of data can deliver previously unattainable intelligence and insight, it […]
November 29, 2018
Via: Dark ReadingInformation security groups often underestimate or overestimate the true value of data assets, making it harder to prioritize controls. Many information security groups are undermining data availability and security by incorrectly estimating the true value of their enterprise information assets, […]
November 27, 2018
Via: Help Net SecurityGDPR is now six months old – it’s time to take an assessment of the regulation’s impact so far. At first blush, it would appear very little has changed. There are no well-publicized actions being taken against offenders. No large […]
November 15, 2018
Via: Aberdeen EssentialsJust because mid-market businesses are smaller doesn’t mean they should act small when it comes to cybersecurity. The percentage of mid-market businesses that have experienced a cyber-attack is up from 55% in 2016 to 61% in 2017, meaning these companies […]
November 7, 2018
Via: Dark ReadingCloud adoption drives organizations to spend in 2019 as they learn traditional security practices can’t keep up. Three quarters of organizations plan to buy more cloud security tools in 2019 as a means to better secure increasingly complex cloud environments, […]
November 5, 2018
Via: DataBreach TodayIn July, the FBI warned that global Losses to business email compromise – aka CEO fraud – attacks have hit at least $12.5 billion. David Stubley, who heads security testing firm and consultancy 7 Elements in Edinburgh, Scotland, which has […]
October 12, 2018
Via: James HughesWith the risk of a cyberattack now being classified as the top threat to organizations, companies all around the globe are still hesitant to spend money to improve their security systems or train their employees. Security threats can put an […]
October 11, 2018
Via: CSO OnlineEnterprise risk management (ERM) is the process of assessing risks to identify both threats to a company’s financial well-being and opportunities in the market. The goal of an ERM program is to understand an organization’s tolerance for risk, categorize it, […]