Given enough time, employees – especially those working remotely – will click on a link to a potentially dangerous website. But how much time? According to recent data, less than an hour.
All about Virtualization and Cloud Security | Recent Articles:
New data shows a sharp increase in monthly business email compromise (BEC) attacks focused on invoice or payment fraud.
An optimistic new report by the World Economic Forum predicts businesses will prioritize security in a bid to ensure longer-term success. The reason? A rapid increase in cyberattacks and pressures escalating from changes prompted by COVID-19.
Rapid changes to how businesses operate offer excellent opportunities for malicious actors to access corporate networks. Infosec professionals report that phishing and whaling attacks taking advantage of unwary employees have risen during the pandemic. At the same time, IT departments are deploying new technologies to support remote work without consulting those on the receiving end, potentially fueling bad actors’ malicious campaigns against businesses.
Before the COVID-19 pandemic, more than 80% of Americans had worked from home either rarely or not at all. Now, more than half are doing so, with no new security policies to help guide them, according to an IBM survey conducted by Morning Consult.
The vast majority of security operations centers (SOCs) are confident in their ability to counter cyber threats, yet few of their frontline workers can aptly track mean time to detection, while organizations still struggle with SOC staff shortages, new research shows.
Even though the number of DDoS attacks decreased over 2019, their complexity and size increased significantly, according to new research from the National Scrubbing Center against DDoS attacks.
The increasing number of sophisticated cyber threats is set to increase demand for Managed Detection and Response (MDR) solutions from the business sector, according to a new forecast by Frost & Sullivan.
The general public is becoming increasingly well-educated about cyber-attacks and ransomware in particular – so much so that consumers are becoming unforgiving of businesses that don't take security seriously. And when they look for someone to blame, they often point the finger at the highest ranks in the organization.
Eight in 10 companies across the United States have experienced a data breach made possible by cloud misconfigurations, according to new research by IDC.
Global enterprises report greater efficiency and productivity, better product/service quality, and improved customer retention and experience, all thanks to recent deployments of Internet of Things (IoT) solutions. But business leaders are also concerned about their next steps. As IoT deployments greatly expand the attack surface for cybercriminals, half of businesses banking on IoT are doing so unprepared to combat cyber risks associated with these purchases.
The term “cyberattack” brings to mind malware, social engineering, network vulnerabilities or unpatched endpoints. But how do malicious actors manage to unleash their attack kill-chain in the first place? What is it that opens the gates to exploiting a weakness and breaching the infrastructure? With human error behind most successful attacks, perhaps we should look not beyond these culprits, but behind them.