March 17, 2020
Via: Help Net SecurityIn most cases of human-operated ransomware attacks against enterprises, the hackers don’t trigger the malware immediately: according to FireEye researchers, in most (75%) of cases, at least three days passed between the first evidence of malicious activity and ransomware deployment. […]
March 2, 2020
Via: Help Net SecurityThe percentage of companies admitting to suffering a mobile-related compromise has grown (39%, when compared to last years’ 33%) despite a higher percentage of organizations deciding not to sacrifice the security of mobile and IoT devices to meet business targets, […]
February 20, 2020
Via: Help Net SecuritySince Edward Snowden’s revelations of sweeping internet surveillance by the NSA, the push to encrypt the web has been unrelenting. Bolstered by Google’s various initiatives (e.g., its prioritizing of websites that use encryption in Google Search results, making Chrome mark […]
December 11, 2019
Via: Help Net SecurityMore than half of CEOs think their enterprise risk management program (ERM) program is not as effective as it should be, a LogicGate survey reveals. Challenges for enterprise risk management programs With companies experiencing an increase in risks and data […]
December 10, 2019
Via: Help Net SecurityEmail is the attackers’ preferred method for gaining a foothold into organizations. Campaign views, a new type of report available to some Microsoft enterprise customers, allows security teams to see how successful specific email attack campaigns have been at compromising […]
November 21, 2019
Via: Help Net SecurityGlobal enterprises’ overconfidence and inadequate data sanitization are exposing organizations to the risk of data breach, at a time when proper data management should be at the forefront of everything they do, according to Blancco. Three quarters (73 percent) agreed […]
November 12, 2019
Via: CSO OnlineBrowsers. You can’t use the Internet without them, but they introduce insecurity and instability to the computing environment. Browsers are the operating system of cloud computing and protecting them will become more and more important. Just last week, Google came […]
Malware, Mobile security, Vulnerabilities
November 11, 2019
Via: Threat PostBig businesses are constantly under attack, and that affects everyone from customers and business partners to parties with national security interests. When successful, the initial compromise is only a means to an end — the real goal is to mount […]
November 6, 2019
Via: Help Net Security86% of enterprises have deployed cloud-based tools, but only 34% have implemented single sign-on (SSO), one of the most basic and critically important cloud security tools, according to Bitglass. The report found that the use of cloud applications has grown […]
October 29, 2019
Via: Help Net SecurityEver since the Web development ecosystem evolved to the current paradigm of code reuse, companies have placed themselves too close to the abyss. Web supply chain attacks are a real security threat – and one which the enterprise is vastly […]
October 16, 2019
Via: Help Net SecurityWhile most enterprises demonstrate a committed effort towards maintaining a well-rounded PKI setup, they still fall short in several key categories. The post-Black Hat survey report generated by AppViewX indicated that the primary reason for these shortfalls resided in the […]
October 1, 2019
Via: Dark ReadingWith the C-suite laying the gauntlet down for digital transformation in the enterprise — tying swift software delivery and market-adaptable tech services directly into core value propositions — many IT departments are entering an enlightenment period. CIOs, chief digital officers, […]
September 25, 2019
Via: Security WeekResearchers at the enterprise security firm Proofpoint said they detected over 15 million unauthorized login attempts to cloud computing networks of US Fortune 500 firms in the first six months of 2019, of which 400,000 were successful. “While it only […]
September 19, 2019
Via: Help Net SecurityAmid a wider range of issues to handle, a majority of board members and senior executives responsible for their organization’s cyber risk management had less than a day in the last year to spend focused on cyber risk issues, the […]
Network security, Threats & Malware, Vulnerabilities
August 8, 2019
Via: Help Net SecurityNCC Group researchers have uncovered significant vulnerabilities in six commonly used enterprise printers, highlighting the vast attack surface that can be presented by internet-connected printers. The research Daniel Romero, managing security consultant and research lead, and Mario Rivas, security consultant […]
August 7, 2019
Via: Dark ReadingEnterprise security teams have long struggled with the complexity of encryption and key management. While integrated solutions are starting to make it easier to encode and decode critical data, the goal of enterprisewide encryption has greatly increased the time it […]
August 1, 2019
Via: Help Net SecurityGoogle is rolling out new security options for G Suite users and admins, aimed at alerting organizations about data exfiltration attempts on Google Drive and helping them protect their high-risk users. The options are both still in beta and some […]
July 29, 2019
Via: Threat PostThe nightmare vision of a “mega-worm” global BlueKeep infection could be closer to becoming reality as working exploits are now becoming available to the public, and there’s evidence that adversaries are actively scanning for the vulnerability. Researchers weighed in with […]
July 22, 2019
Via: Security IntelligenceAccording to IDC, Google Android is expected to capture 86.7 percent of the worldwide operating system market by the end of 2019, continuing to show growth from the already eye-popping 85.1 percent reported last year. The popularity of Android lends […]
July 12, 2019
Via: Help Net SecurityThe increasing adoption of digitalization and globalization of enterprises have made IT resources prone to cyber attacks. This has increased the demand for encryption management solutions which will help prevent such cyber attacks. Enterprises are implementing BYOD policies and integrating […]