Mobile security, Network security
January 24, 2019
Via: Security IntelligenceWhile most security professionals have come to embrace — or, at least, accept — bring-your-own-device (BYOD) policies, leadership still often lacks confidence in the data security of employees’ personal phones, tablets and laptops. In a recent study from Bitglass, 30 […]
Network security, Threats & Malware, Virus & Malware
January 23, 2019
Via: Dark ReadingA new report on the state of malware shows a spike in B2B malware, with former banking Trojans Emotet and TrickBot topping the list. Enterprise threats ramped up toward the end of 2018 as cybercriminals shifted their strategies to hit […]
Application security, Mobile security
January 23, 2019
Via: Security IntelligenceMobile applications have become a part of our everyday lives. We use them to get where we’re going, stay in constant communication with others and get the information we need to be productive. Apps are no longer a novelty for […]
Malware, Threats & Malware, Virus & Malware
January 15, 2019
Via: Help Net SecurityA cybercriminal group dubbed Grim Spider has been using the Ryuk ransomware to exclusively target enterprises and has managed to amass over 705 Bitcoins (around $3.7 million) from the victims in less than six months. CrowdStrike and FireEye researchers have […]
December 12, 2018
Via: Help Net SecurityA future where the Internet of Things spreads exponentially is almost certain. Seemingly everybody wants these devices: consumers for the helpful features and manufacturers for the ability to collect data about the product and consumers’ use of it. Paul Calatayud, […]
Mobile security, Network security
November 26, 2018
Via: Security IntelligenceOver the next few years, the pace of business will accelerate exponentially. 5G will enable the future enterprise technologies everyone is predicting and waiting for: fleets of self-driving delivery trucks, virtual (VR) and augmented reality (AR), and a world of […]
November 15, 2018
Via: CSO OnlinePrivacy Company released the results of a data protection impact assessment showing privacy risks in the enterprise version of Microsoft Office. Regarding the “large scale and covert collection of personal data” of Microsoft Office ProPlus (Office 2016 MSI and Office […]
November 15, 2018
Via: Security IntelligenceDespite frequent news headlines describing large-scale data breaches around the globe, chief information security officers (CISOs) still struggle to justify security investments to top leadership. According to Gartner, security spending makes up only about 5.6 percent of overall IT funds. […]
November 15, 2018
Via: Aberdeen EssentialsJust because mid-market businesses are smaller doesn’t mean they should act small when it comes to cybersecurity. The percentage of mid-market businesses that have experienced a cyber-attack is up from 55% in 2016 to 61% in 2017, meaning these companies […]
November 9, 2018
Via: Security IntelligenceMore than ever, customers understand their right to data privacy. As major brands continue to lose sensitive data to cybercriminals in high-profile cloud security failures, customer trust in companies across industries is fading. Only 25 percent of consumers believe most […]
Application security, Malware, Mobile security
October 29, 2018
Via: Security IntelligenceTwo decades ago, AOL Instant Messenger (AIM) changed the way we communicate. It was more private than a phone conversation — which was especially great if you worked in a cubicle — and the real-time nature of the conversations was […]
October 11, 2018
Via: CSO OnlineEnterprise risk management (ERM) is the process of assessing risks to identify both threats to a company’s financial well-being and opportunities in the market. The goal of an ERM program is to understand an organization’s tolerance for risk, categorize it, […]
August 1, 2018
Via: Dark ReadingDo you know what happens to your data when it’s not in use? If the answer is no, you need to fix that. When cyberattacks take place in enterprises, the resulting data lives in various siloes: security information and event […]
June 26, 2018
Via: Dark ReadingA new report offers data and analysis as to why midsized organizations hit a cybersecurity sweet spot in terms of security efficacy. A new report based on data from an extensive body of penetration tests shows that while prevailing opinion […]
June 18, 2018
Via: Security IntelligenceThe use of virtual private networks (VPNs) in the enterprise has come a long way. What was once a simple way to ensure a secure connection between an external network and a company’s internal network has become increasingly difficult to […]
May 9, 2018
Via: Dark ReadingMobile devices are becoming a ‘primary’ enterprise target for attackers. How does it change security when the label we have for a device no longer describes what it does? That was a key question Mike Murray, vice president of security […]
May 4, 2018
Via: Dark ReadingCompanies may try to promote good password hygiene among users, but obstacles remain fairly profound, even after years of prodding by IT and security managers. What better time than World Password Day to explore this issue? Frank Dickson, a research […]
April 23, 2018
Via: Security IntelligenceBlockchain technology was perhaps the most controversial topic at last week’s RSA Conference in San Francisco. It’s fitting, because distributed ledger technologies are also hotly debated in conversations about enterprise technology. For most organizations, the idea of blockchain is suspended […]
February 26, 2018
Via: Dark ReadingThe average business uses 1,181 cloud services, and most don’t meet all recommended security requirements, Netskope says. Think your company’s cloud usage is secure? Think again. Data shows the average businesses has 1,181 cloud services, and nearly all of them […]
February 16, 2018
Via: Security AffairsDell EMC addressed two critical vulnerabilities that affect the management interfaces for its VMAX enterprise storage systems. The Dell EMC’s VMAX Virtual Appliance (vApp) Manager is an essential component of a wide range of the enterprise storage systems. The first […]