February 8, 2019
Via: TechRadarDealing with risk is something businesses do every day and in today’s digital world IT outages can have severe consequences for companies of any size. To aid businesses in understanding the risks they face, global insurer Allianz releases a Risk […]
February 1, 2019
Via: TechRadarCybersecurity can be a difficult investment to quantify. In a world where breaches have become near ubiquitous, how much security is enough? Unfortunately, for many mid-sized firms, the default setting is to do just enough to get by, investing ad […]
December 12, 2018
Via: Threat PostNYC — From Delta Airlines to Best Buy, a number of big-name companies were involved this year in data breaches – but even though their names made headlines, the actual security incidents occurred due to flaws in third-party partners. Across […]
December 10, 2018
Via: Help Net SecurityOffice 365 – the online, subscription-based version of Microsoft’s Office application suite – is one the most widely used enterprise cloud applications/services, which makes it the preferred target of attackers looking to gain access to sensitive business information. “Once an […]
October 30, 2018
Via: Help Net SecurityMcAfee released its Cloud Adoption and Risk Report, which analyzed billions of events in anonymized customers production cloud use to assess the current state of cloud deployments and to uncover risks. The report revealed that nearly a quarter of the […]
October 12, 2018
Via: James HughesWith the risk of a cyberattack now being classified as the top threat to organizations, companies all around the globe are still hesitant to spend money to improve their security systems or train their employees. Security threats can put an […]
October 9, 2018
Via: Symantec ConnectCloud computing has gone mainstream as more organizations shift their applications and workloads from on-premise data centers to public cloud platforms. Almost every company in the world—96 percent, according to one annual survey[1]—has moved some part, if not the majority, […]
Vulnerabilities, Wireless security
October 5, 2018
Via: Threat PostA staggering 83 percent of home and office routers have vulnerabilities that could be exploited by attackers. Of those vulnerable, over a quarter harbor high-risk and critical vulnerabilities, according to a report released this week by American Consumer Institute on […]
October 2, 2018
Via: Security IntelligenceData breaches that compromise hundreds of thousands — or millions — of records tend to grab the most headlines, but small- and medium-sized businesses (SMBs) are far from immune to cyberattacks. SMB security is full of holes, and these vulnerabilities […]
September 20, 2018
Via: Security WeekWhen we hear the term “insider trading” most people think of the illegal practice of trading a public company’s stock based on material, non‐public information. The image of Michael Milken, Ivan Boesky or Martha Stewart may come to mind. Yet […]
August 28, 2018
Via: Panda SecurityThe tech industry moves at such a pace that, often, just as we are getting used to a trend, along come several more that have already taken its place. This is also the case when it comes to corporate cybersecurity: […]
August 14, 2018
Via: Threat PostRespondents in a survey from Venafi said they believe voting machines, encrypted communications from polling stations and databases that store voter registration data are all vulnerable. As the U.S. midterm election season gets underway in earnest, concerns about the ability […]
August 3, 2018
Via: Dark ReadingAs the DevOps movement goes mainstream, IT security leaders have one of the best opportunities in a generation to significantly move the needle on protecting against cybersecurity risk across the entire IT stack. DevOps’ emphasis on cross-functional teaming, incremental improvements, […]
Cloud security, Mobile security
July 16, 2018
Via: Threat PostConventional wisdom has shown there’s a short line between a company’s highest point of risk – its employees and a compromise. Unsanctioned, or shadow applications, are apps that haven’t been cleared by a company’s information security team. These apps, on […]
July 5, 2018
Via: Security AffairsThere’s a prevailing mindset that suggests if organizations ban all the things that pose risks to overall cybersecurity, they’re taking the most effective approach to make their organizations secure. Initially, that line of thinking seems sensible in some regards. After […]
July 3, 2018
Via: Security WeekLast month, in The War Few are Talking About, I described industrial cyberattacks as a form of “economic warfare” designed to advance geopolitical agendas. Just as the world came to recognize IT cyberattacks as a new form of profit-driven crime, […]
April 25, 2018
Via: CIOStartup slogans are inescapable in tech: Move fast. Break things. Minimum viable product. These are exciting ideas, for sure, but to put them to use in IT, you’ll need to tailor them to your context. For IT executives running established […]
March 16, 2018
Via: Security IntelligenceCompanies operating within the industrial and energy and utilities sectors are responsible for protecting the critical infrastructure we all rely upon to live. However, these companies must also operate their businesses more effectively and efficiently to meet consumer and government […]
February 7, 2018
Via: Dark ReadingCompanies overlook critical security steps as they move to adopt the latest cloud applications and services. Businesses deploying cloud-based applications and services often overlook critical security steps as they scramble to keep up with the latest technology, and the rush […]
January 30, 2018
Via: Dark ReadingThe technique is easy to carry out and can cause much damage. Here’s what you need to know about fighting back. In its bag of tricks, the recently discovered MaMi malware has the ability to modify the DNS configuration of […]