June 28, 2019
Via: Threat PostIntroduced to the market nearly two decades ago, enterprise VPN technology has been uniquely enduring. Most large organizations still employ a VPN solution, and many seem to rely on it unquestioningly to provide secure remote access. It’s a rarefied position […]
June 26, 2019
Via: Help Net SecurityEnterprises are struggling to keep up with the rapid expansion of cloud within their businesses, according to Symantec. Surveying 1,250 security decision makers across the globe, Symantec’s Cloud Security Threat Report (CSTR) uncovered insights on the shifting cloud security landscape, […]
June 25, 2019
Via: Help Net Security50% of large enterprises view third-party partners of any size as a cybersecurity risk, but only 14% have experienced a breach as the result of a small business partner, while 17% have been breached as the result of working with […]
June 19, 2019
Via: William PalmerFacial recognition technology is the new gold standard for the modern business world. Although these face-detecting systems have been around for decades, their use has expanded tremendously in a rather short period of time. So much, in fact, that they […]
June 10, 2019
Via: Dark ReadingCybersecurity at the enterprise level is a unique beast, and there’s no better place to meet fellow enterprise security professionals and learn new tricks than Black Hat USA in Las Vegas this August. There’s a whole Enterprise track of Briefings […]
April 26, 2019
Via: Security IntelligenceEffective threat management requires security teams to combine security analytics with the abundance of machine-generated data that is prevalent in most enterprise environments. Tools such as network traffic analysis, endpoint detection, security information and event management (SIEM), and user behavior […]
April 16, 2019
Via: Help Net SecurityUnpatched vulnerabilities, along with growing network and application complexity pose an ongoing security risk which could threaten the security of enterprise IT networks. Analyzing the biggest security findings over the past year, Keysight has released the third annual security report […]
March 29, 2019
Via: Help Net SecurityThe majority of organizations (nearly 70 percent) do not prioritize the protection of the applications that their business depend on – such as ERP and CRM systems – any differently than how low-value data, applications or services are secured. Even […]
March 14, 2019
Via: AberdeenLife used to be so simple, according to Aberdeen research. Rather, regarding enterprise data privacy and compliance, things used to be simpler. It used to be that you’d deny access by default and allow access by selective exception. Now, the […]
March 10, 2019
Via: James HughesMobile Threat Defense (MTD), Mobile Threat Management (MTM), Mobile Threat Prevention (MTP)—regardless of the exact terminology, these all lead to the same concern: securing mobile devices. The highly digital world we live in has fundamentally changed the way we work. […]
March 8, 2019
Via: Dark ReadingAs more enterprise work takes place on mobile devices, more companies are feeling insecure about the security of their mobile fleet, according to a new Verizon report. RSA CONFERENCE 2019 – San Francisco – As more enterprise work takes place […]
Threats & Malware, Virus & Malware
March 7, 2019
Via: Help Net SecurityThe cost to companies from malware and “malicious insider”-related cyberattacks jumped 12 percent in 2018 and accounted for one-third of all cyberattack costs, according to new research published today by Accenture and the Ponemon Institute. Based on interviews with more […]
March 5, 2019
Via: Dark ReadingInternal security teams at enterprise organizations are generally getting better at detecting compromises, but it’s still taking them well over a month to discover them. A FireEye analysis of global breach data from 2018 shows that half of all organizations […]
March 4, 2019
Via: Help Net SecurityIT decision makers are facing major challenges between dynamic adversaries, significant legislation and regulation requirements, business digital transformation needs, and a rapidly growing array of technology solutions. Ideally, business requirements would be the key motivator for an organization’s approach to […]
March 1, 2019
Via: Help Net SecurityAs the use of SSL grows to the point where it’s the standard protocol, cybercriminals are increasingly using encryption to conceal and launch attacks. This has become possible because SSL certificates, which used to be difficult to obtain, are now […]
Cyber warfare, Network security
February 5, 2019
Via: Security IntelligenceWhen a client asked me to help build a cyberthreat intelligence program recently, I jumped at the opportunity to try something new and challenging. To begin, I set about looking for some rudimentary templates with a good outline for building […]
January 31, 2019
Via: Help Net SecurityMicrosoft has announced a number of new capabilities and improvements for tools used by enterprise administrators. New Microsoft 365 security and compliance centers The new Microsoft 365 security center allows security administrators and other risk management professionals to manage and […]
January 29, 2019
Via: CIOIf you have any doubts that digital transformation is top of mind for IT executives, just take a look at what they’re buying. Spending on enterprise software, particularly cloud services and applications, is expected to grow faster than any other […]
January 25, 2019
Via: Help Net SecuritySome attacks are fairly trivial, but others are multi-vector/multi-platform threats where multiple functionalities are combined as part of the same malicious threat (e.g., XBash, which combines cryptomining, ransomware and botnet/worm activity). The way in The attacks are automated and probe […]
Cloud security, Network security
January 24, 2019
Via: Help Net SecurityAs enterprises expand, through organic growth or acquisition, they need to support the IT needs of more distributed locations. These often include teams in shared office spaces versus enterprise-owned or leased facilities. To serve remote locations and users, enterprises are […]