The US National Security Agency (NSA) has published an important document outlining the main classes of cloud vulnerabilities and the ways an organization can go about addressing them.
All about Virtualization and Cloud Security | Recent Articles:
IT auditors—the people who conduct examinations of the management controls within an organization’s IT infrastructure to determine if technology assets are secure and to ensure data integrity—have had their hands full lately.
A Canadian insurance company that fell victim to ransomware last year has managed to obtain the decryptor from its aggressors, then went on to freeze their Bitcoin wallet using a clever trick.
Earlier this week, police in Japan launched what was described as a "three day public-private cybersecurity exercise" focusing on the risks faced by teleworkers.
What is security culture? There’s lots of talk about how important security culture is to a security program, but security culture is a nebulous concept to attempt to define — and harder still to measure. It’s also, apparently, difficult to achieve: a survey from the IT governance professional’s organization ISACA found that nine in ten enterprises said they have a gap between the security culture they want to have and the actual culture they have in place.
From humble beginnings of protecting traditional PCs, endpoint security has evolved to protect complex systems in large organizations, safeguarding diverse environments including business-issued hardware, bring-your-own-device (BYOD) programs, and more. The latest TAG Cyber Security Annual report spots the trends in endpoint security and how they relate to cybersecurity in general.
Many companies are coming to the realization that an effective anti-malware tool is insufficient to protect their business in today’s threat landscape. It is this realization that has driven the uptake of a more comprehensive service, known to the industry as Managed Detection and Response, or MDR for short. This service helps small to medium enterprises limit risk to their businesses by outsourcing 24/7 Detect and Response operations to an established service provider allowing them to reduce complexity and cost.
Precisely 13 years ago, on January 28, the Council of Europe initiated European Data Protection Day to raise awareness of best practices for data protection and to help boost knowledge about personal data among organizations and individuals.
The price of a ransomware attack can be ascertained more precisely than other types of attacks, and a new study unveils the expected costs that a company incurs during such an event.
Whenever we hear about major cyber security attacks such as data breaches, it’s typically larger enterprises that are the victims. That makes sense, considering those events can potentially impact a lot of people and therefore are more likely to grab headlines and garner attention.
Of all the possible concerns global businesses can have, cyber security threats are at the top of the list, according to recent research by insurance firm The Travelers Companies.
Cyber-attacks on government institutions and critical infrastructures have increased considerably in recent years, with the United States seemingly painted as the bullseye for ransomware operators in 2019. Infosec experts argue that state institutions spend too little on cybersecurity, and a recent study shows they may be right