Cyber threats lurk behind every corner, in every industry and geography. From run-off-the-mill crooks to sophisticated state-sponsored actors, cybercriminals take every opportunity to exploit weaknesses for quick cash, to exfiltrate data, or to simply disrupt operations, depending on their goal.
All about Virtualization and Cloud Security | Recent Articles:
The US National Security Agency (NSA) has published an important document outlining the main classes of cloud vulnerabilities and the ways an organization can go about addressing them.
A Canadian insurance company that fell victim to ransomware last year has managed to obtain the decryptor from its aggressors, then went on to freeze their Bitcoin wallet using a clever trick.
Cyber-attacks on government institutions and critical infrastructures have increased considerably in recent years, with the United States seemingly painted as the bullseye for ransomware operators in 2019. Infosec experts argue that state institutions spend too little on cybersecurity, and a recent study shows they may be right
Despite growing risks, many companies are still poorly protected against the type of reputational crisis that a cyber incident can deliver, according to research by Allianz.
Credit reporting agency Equifax continues to pay through the nose after the mega breach it suffered in 2017 resulted in the leak of 147 million customer records and the firing of three executives.
Cybersecurity shot up to the #1 spot as the top peril for companies globally this year, from #2 last year and as low as #15 seven years ago, according to financial services firm Allianz.
If security incidents in the past few years are any indication, cybersecurity professionals face a bumpy road ahead. While some IT security chiefs are prepared to hang up their boots, many are almost certain their organization is under attack from hackers but they haven’t yet learned of it.
Organizational weak spots and stressors are taking their toll on IT security professionals. 72% of infosec professionals agree that the lack of proper security tools and knowledge are huge obstacles preventing rapid incident detection and response. Furthermore, more than half of C-suite security pros are considering leaving their job if things don’t change in 2020 and beyond.
A study comparing security controls for human and machine identities reveals a worrying trend. While almost all organizations have a policy that governs password length for human identities, only half have a written policy on length and randomness of keys for machine identities - this, despite the rapid spread of machines that need to authenticate themselves to each other so they can communicate securely.
Financial services firms accounted for 6% of all data breaches in 2019 but more than 60% of leaked records, partly due to the Capital One mega breach that compromised more than 100 million records, according to a new study.
Most Enterprise IT pros believe cybersecurity vendors use ambiguous data, and sometimes even resort to lies to peddle their products, according to a new survey.