Companies increasingly reporting attacks attributed to foreign governments

January 15, 2020

More than one in four security managers attribute attacks against their organization to cyberwarfare or nation-state activity, according to Radware. Nation-state intrusions soaring In 2018, 19% of organizations believed they were attacked by a nation-state. That figure increased to 27% […]

US officials, lawmakers warn of potential Iranian cyberattacks

January 6, 2020

Senior government officials and lawmakers warned Friday that Iran may attempt to carry out cyberattacks against the U.S. in retaliation for the killing of Quds Force commander Qassem Soleimani. “The Iranians have a deep and complex cyber capability, to be […]

Only 54% of security pros have a written policy on length and randomness for keys for machine identities

December 27, 2019

People rely on usernames and passwords to identify themselves to machines so they can gain access to data and services. Machines also need to authenticate themselves to each other so they can communicate securely, relying on cryptographic keys and digital […]

Cloud security, Security

What differentiates Oracle from other cloud providers when it comes to security?

January 16, 2020

Via: TechRadar

Cybersecurity is an important aspect and it becomes more precarious when organisations are flocking to the cloud to deploy mission-critical apps. Data is the new oil of the 21st century. The opportunity that the cloud presents also brings in challenges […]

Cyber-crime, Phishing

A quarter of users will fall for basic phishing attacks

January 16, 2020

Via: Computer Weekly

Slightly more than a quarter of people will fall for a phishing scam that claims to be an urgent message prompting them to change a password, according to statistics gathered by cyber security testing and training firm KnowBe4, which specialises […]

Network security, Security

How SD-WAN Helps Achieve Data Security and Threat Protection

January 15, 2020

Via: Dark Reading

Retail and banking technology professionals are keenly aware of the large number of devices that connect to their enterprise’s network via Ethernet and Wi-Fi. IT sprawl at each branch adds complexity to network visibility and security, and that complexity means […]