Advertisement
Top

Tag: Risk


Network security

Cyber incidents are now a top risk for global businesses

February 8, 2019

Via: TechRadar

Dealing with risk is something businesses do every day and in today’s digital world IT outages can have severe consequences for companies of any size. To aid businesses in understanding the risks they face, global insurer Allianz releases a Risk […]


Network security

Why risk-based security is the key to driving business value in 2019

February 1, 2019

Via: TechRadar

Cybersecurity can be a difficult investment to quantify. In a world where breaches have become near ubiquitous, how much security is enough? Unfortunately, for many mid-sized firms, the default setting is to do just enough to get by, investing ad […]


Vulnerabilities

Supply Chain Security: Managing a Complex Risk Profile

December 12, 2018

Via: Threat Post

NYC — From Delta Airlines to Best Buy, a number of big-name companies were involved this year in data breaches – but even though their names made headlines, the actual security incidents occurred due to flaws in third-party partners. Across […]


Email security

Mitigating the risk of Office 365 account hijacking

December 10, 2018

Via: Help Net Security

Office 365 – the online, subscription-based version of Microsoft’s Office application suite – is one the most widely used enterprise cloud applications/services, which makes it the preferred target of attackers looking to gain access to sensitive business information. “Once an […]


Cloud security

21% of all files in the cloud contain sensitive data

October 30, 2018

Via: Help Net Security

McAfee released its Cloud Adoption and Risk Report, which analyzed billions of events in anonymized customers production cloud use to assess the current state of cloud deployments and to uncover risks. The report revealed that nearly a quarter of the […]


Editorial

Vulnerable or Not? How Your Employees Respond to Cyber Threats

October 12, 2018

Via: James Hughes

With the risk of a cyberattack now being classified as the top threat to organizations, companies all around the globe are still hesitant to spend money to improve their security systems or train their employees. Security threats can put an […]


Cloud security, Security

Race to the Cloud Creates Security Complexity

October 9, 2018

Via: Symantec Connect

Cloud computing has gone mainstream as more organizations shift their applications and workloads from on-premise data centers to public cloud platforms. Almost every company in the world—96 percent, according to one annual survey[1]—has moved some part, if not the majority, […]


Vulnerabilities, Wireless security

ThreatList: 83% of Routers Contain Vulnerable Code

October 5, 2018

Via: Threat Post

A staggering 83 percent of home and office routers have vulnerabilities that could be exploited by attackers. Of those vulnerable, over a quarter harbor high-risk and critical vulnerabilities, according to a report released this week by American Consumer Institute on […]


Network security

SMB Security Best Practices: Why Smaller Businesses Face Bigger Risks

October 2, 2018

Via: Security Intelligence

Data breaches that compromise hundreds of thousands — or millions — of records tend to grab the most headlines, but small- and medium-sized businesses (SMBs) are far from immune to cyberattacks. SMB security is full of holes, and these vulnerabilities […]


Network security

Mitigate Risk From Malicious and Accidental Insiders

September 20, 2018

Via: Security Week

When we hear the term “insider trading” most people think of the illegal practice of trading a public company’s stock based on material, non‐public information. The image of Michael Milken, Ivan Boesky or Martha Stewart may come to mind. Yet […]


Security, Vulnerabilities

XSS vulnerabilities are still alarmingly common

August 28, 2018

Via: Panda Security

The tech industry moves at such a pace that, often, just as we are getting used to a trend, along come several more that have already taken its place. This is also the case when it comes to corporate cybersecurity: […]


Vulnerabilities

ThreatList: Almost All Security Pros Believe Election Systems Are at Risk

August 14, 2018

Via: Threat Post

Respondents in a survey from Venafi said they believe voting machines, encrypted communications from polling stations and databases that store voter registration data are all vulnerable. As the U.S. midterm election season gets underway in earnest, concerns about the ability […]


Network security

6 Ways DevOps Can Supercharge Security

August 3, 2018

Via: Dark Reading

As the DevOps movement goes mainstream, IT security leaders have one of the best opportunities in a generation to significantly move the needle on protecting against cybersecurity risk across the entire IT stack. DevOps’ emphasis on cross-functional teaming, incremental improvements, […]


Cloud security, Mobile security

Unsanctioned Apps Invite Fox into Cybersecurity Hen House

July 16, 2018

Via: Threat Post

Conventional wisdom has shown there’s a short line between a company’s highest point of risk – its employees and a compromise. Unsanctioned, or shadow applications, are apps that haven’t been cleared by a company’s information security team. These apps, on […]


Network security

Why Banning Risks to Cybersecurity Doesn’t Actually Improve Cybersecurity

July 5, 2018

Via: Security Affairs

There’s a prevailing mindset that suggests if organizations ban all the things that pose risks to overall cybersecurity, they’re taking the most effective approach to make their organizations secure. Initially, that line of thinking seems sensible in some regards. After […]


Network security

You Know You’re at Risk, Now What?

July 3, 2018

Via: Security Week

Last month, in The War Few are Talking About, I described industrial cyberattacks as a form of “economic warfare” designed to advance geopolitical agendas. Just as the world came to recognize IT cyberattacks as a new form of profit-driven crime, […]


Network security

How to manage IT risk without killing innovation

April 25, 2018

Via: CIO

Startup slogans are inescapable in tech: Move fast. Break things. Minimum viable product. These are exciting ideas, for sure, but to put them to use in IT, you’ll need to tailor them to your context. For IT executives running established […]


Mobile security

At Your Own Risk: Managing Internet of Things (IoT) Risks for Industrial and Utility Companies

March 16, 2018

Via: Security Intelligence

Companies operating within the industrial and energy and utilities sectors are responsible for protecting the critical infrastructure we all rely upon to live. However, these companies must also operate their businesses more effectively and efficiently to meet consumer and government […]


Cloud security

Security vs. Speed: The Risk of Rushing to the Cloud

February 7, 2018

Via: Dark Reading

Companies overlook critical security steps as they move to adopt the latest cloud applications and services. Businesses deploying cloud-based applications and services often overlook critical security steps as they scramble to keep up with the latest technology, and the rush […]


Network security

DNS Hijacking: The Silent Threat That Is Putting Your Network at Risk

January 30, 2018

Via: Dark Reading

The technique is easy to carry out and can cause much damage. Here’s what you need to know about fighting back. In its bag of tricks, the recently discovered MaMi malware has the ability to modify the DNS configuration of […]