As new threats hit enterprise systems and light up enterprise security dashboards, security analysts need to make swift and accurate decisions so that they can respond in the best way possible. Yet, so many alerts come at any given time that the ability for the typical security team to focus on the alerts that matter can seem impossible.
All about Virtualization and Cloud Security | Recent Articles:
It’s often asked, why can’t security innovate more?
It seems that every week new news breaks regarding the progress toward reaching practical quantum computing. While this is excellent news for the promised benefits quantum computing will provide, it helps society tackle the biggest problems in computing that traditional computers just can't handle. These include potential breakthroughs in artificial intelligence, the complex modeling involved in nuclear fusion, improved solar cells, cancer, and disease treatments, and financial markets modeling.
- S. Secretary of Homeland Security details Federal Cybersecurity Strategy.
- Initial focus on ransomware, workforce, industrial control security.
- The federal government needs to take a risk-based, long-term view on cybersecurity.
- Executive order under consideration would expand what companies have to disclose security breaches to the federal government.
- Such breach disclosure laws have been long found over legal concerns.
- The EO would also establish that certain software vendors maintain a software bill of materials.
- 53% of Web traffic is now cloud-related, a 20% year over year increase.
- 61% of all malware is directly delivered via the cloud.
- Malicious Office documents represented 17% of all malware detected.
- Analysts expect the global IoT market to grow from about $212 billion in 2018 to about 1.3 trillion by 2026
- Unfortunately, these devices often ship with security flaws, poor API management, and lack efficient ways to provide security updates
- Special Publication 800-213 helps federal agencies understand how IoT devices can impact the network and information security risks within their organizations
- 83% of employers now say the shift to remote work has been successful for their company, compared to 73% in a prior survey.
- Less than one in five executives say they want to return to the office as it was pre-pandemic.
- Enterprises are going to have to balance convenience and security over the long haul.
- As enterprises get comfortable with remote work, their priorities are going to shift.
- Cybersecurity will be forefront in the year ahead between concerns about cyber espionage and ongoing nation-state attacks, and federal cybersecurity organizational efforts.
- Remote work has accelerated enterprises are turning zero trust architectures to improve their security.
- As enterprises, and their home workers, deploy IoT devices, the risks these devices pose to enterprise data and systems increases.
- First released in 2019, the IoT Security Controls Framework established 155 essential security controls that the CSA believed would mitigate many of IoT's risk.
- The new version of the CSA IoT Security Controls Framework provides clarity on guidance and security enhancements
- When it came to healthcare security, 2020 proved to be a continuation of the state of cybersecurity in prior years.
- While there was considerable concern about some type of digital attacks during the U.S. presidential elections, so far, there's been no credible evidence showing such occurred.
- One of the more interesting attacks last year was one everyone had the opportunity to watch occur in real-time. And that's the Twitter attack that resulted in the widespread tweeting of a bitcoin scam the summer.
- Not enough organizations are continuously looking for risks in their IT assets.
- Interestingly, organizations with immature programs are more confident in their ability to manage their attack surface.
- Enterprises need to put monitoring regimes in place that can keep pace with technological change.