The continuous advancement in technology predicts around 200 billion objects and devices which include medical instruments, manufacturing machines, cars, phones, and, home appliances will be communicating with each other through the Industrial Internet…
Tag: enterprise security
Europe, Global Security News, North America
How do Cryptocurrencies Affect Cybersecurity?
by Naimisha •
The digitization of our world is continuing at an accelerating pace. More and more of our lives and our economy are moving online. Even our money is increasingly digital. We use credit cards and bank transfers to make most of […]
The post How do Crypto…
Security Bloggers, Security Vendor News
Report: Ransomware Attacks and the True Cost to Business 2022
by Cybereason Team •
Ransomware continues to dominate the threat landscape in 2022. Organizations are under siege from a wide variety of threats, but ransomware offers threat actors a unique combination of very low risk with very high reward—which is why the volum…
Security Bloggers, Security Vendor News
Spear Phishing: A Technical Case Study for XDR
by Anthony M. Freed •
Spear phishing is a social engineering tactic adversaries use in targeted attacks where they send emails purported to be from someone known or trusted by the target–such as a coworker or established organization–to trick them into revealing co…
Security Bloggers, Security Vendor News
How Do Ransomware Attacks Impact Victim Organizations’ Stock?
by Anthony M. Freed •
Ransomware has developed into an extremely lucrative business model with little risk involved for the threat actors. Couple this with the willingness of most victim organizations to pay the ransom demand under the assumption it will return bus…
Europe, Global Security News, North America
World Password Day: Why we need a password-less future
by Tim Cawsey •
If you’ve read part one, you’ll know that there’s a persistent problem with passwords. Despite the continued warnings, data breaches and endless guidance – weak and easily hackable passwords still guard a sobering number of online accounts and identiti…
Europe, Global Security News, North America
World Password Day: Why are passwords still a problem in 2022?
by Tim Cawsey •
World Password Day has come around again. Since its inception, it’s an awareness day designed to promote and reinforce the importance of better habits when it comes to password settings.
The post World Password Day: Why are passwords still a problem in…
North America
Switching to 5G? Know Your Integrated Security Controls
by Sourav Banerjee •
5G is a big leap in mobile technology. It presents enterprises and service providers with capabilities for advanced applications, content delivery and digital engagement anywhere. It enables businesses with new use cases and integrated security needs to have a trusted network and application/data delivery function. How does one build a secure 5G network that provides […]
The post Switching to 5G? Know Your Integrated Security Controls appeared first on Security Intelligence.
Europe, Global Security News, North America
Pandemic Two Years On: The Security Challenge of Hybrid Working
by Danna Bethlehem •
Two years ago, the Covid-19 pandemic forced millions of workers across the globe into remote working and turned the way we work on its head. Prior to the pandemic, flexible or remote working arrangements had been the exception in most organisations – y…
Security Bloggers, Security Vendor News
CISO Stories Podcast: Why Are We Still Failing at Security?
by CISO Stories Podcast •
Why are we failing at security, and will we ever graduate from Cyber-Kindergarten? The industry has arguably made a lot of progress over the last three decades, yet the attackers still enjoy a distinct advantage. Wayman Cummings, VP of Secu…
Security Bloggers, Security Vendor News
Operational Resilience: Bridging the Communications Gap
by Greg Day •
If you talk to most any CSO, they want to be relevant in the least–if not a member of the company’s Board of Directors. It’s human nature: we are both ambitious to get to the next level, but also curious to hear the conversations occurring …
Security Bloggers, Security Vendor News
CISO Stories Podcast: The CISO Six Minute Rule
by CISO Stories Podcast •
Sharing sensitive information on a website is likely to solicit a ‘No Way” response from the CISO. Renee Guttmann was faced with these decisions early in her career and needed a way to determine and communicate the right pragmatic and ethic…
Security Bloggers, Security Vendor News
Defend Forward: Taking the Fight to the Adversary
by Greg Day •
Thirty years ago, when I first started working in cybersecurity, I remember joking with my wife, who worked in healthcare, that she saved people’s lives while I saved their computers. How times have changed…
Security Bloggers, Security Vendor News
CISO Stories Podcast: Lessons Learned from Building an ISAC
by CISO Stories Podcast •
Information Sharing and Analysis Centers (ISACs) were formed to promote the centralized sharing of threat intelligence within a particular sector. These have grown since the first ISAC in the late 1990’s and now represent over 20 industry s…
Security Bloggers, Security Vendor News
CISO Stories Podcast: Richard Clarke – Getting the Board on Board with Security
by CISO Stories Podcast •
Richard Clarke spent several decades serving Presidents of both parties and understands what is necessary to implement effective security programs. Join us as he provides pragmatic tips for working with the Board of Directors to effectively…
Europe, Global Security News, North America
The Security Imperative: Data Protection
by Ryan Smith •
As cyberthreats to supply chain, infrastructure and operational technology (OT)—not to mention rogue activity sponsored by nation-states—continue to increase, there is one constant: Good data protection has never been more critical. Successful data pr…
Security Bloggers, Security Vendor News
Webinar March 15th: CISO Roundtable – Top CISO Priorities for 2022
by CISO Stories Podcast •
For security leaders, it can be hard to catch a break when faced with the increasingly challenging task of defending their organizations from evolving threats while simultaneously fighting the battle of the budget in an effort to do more wi…
Security Bloggers, Security Vendor News
CISO Stories Podcast: A Cost-Effective Approach to Security Risk Management
by CISO Stories Podcast •
Risk management is arguably one of the most important functions of the CISO. So, how does the CISO establish the value proposition for an investment? Jack Jones, Chief Risk Scientist at RiskLens, discusses using a well-tested risk framework…
Security Bloggers, Security Vendor News
CISO Stories Podcast: Creating Security Budget Where There is No Budget
by CISO Stories Podcast •
Over the years, security departments acquire tool after tool, sometimes integrated, and many times under-utilized. Kevin Richards, President at Secure Systems Innovation, walks through a very creative method for getting the budget you need,…
Security Bloggers, Security Vendor News
CISO Stories Podcast: Designing a Shared Vision with IT and the Business
by CISO Stories Podcast •
The locus of control has been slipping away from IT teams (and by default Security teams), and this “challenge” to IT governance has accelerated post-covid with a more distributed workforce. The security implications of this are significant…
Security Bloggers, Security Vendor News
CISO Stories Podcast: Designing a Shared Vision with IT and the Business
by CISO Stories Podcast •
The locus of control has been slipping away from IT teams (and by default Security teams), and this “challenge” to IT governance has accelerated post-covid with a more distributed workforce. The security implications of this are significant…
Europe, Global Security News, North America
Survey Shows Lack of Confidence in Network Security
by Michael Vizard •
A survey of 2,045 IT leaders found that, despite technological advances, the majority of respondents still don’t have much confidence in their network security. The survey was conducted by Cato Networks, a provider of a secure access service edge (SAS…
Security Bloggers, Security Vendor News
CISO Stories Podcast: Server Room to War Room – Enterprise Incident Response
by CISO Stories Podcast •
In many organizations, the CISO will be looked at as the leading expert in incident response, but often has little involvement in the selection, planning, and training for the Enterprise Incident Management Program. Dawn-Marie Hutchinson, C…
Security Bloggers, Security Vendor News
CISO Stories Podcast: Key Issues to Cover for Today’s CISOs
by CISO Stories Podcast •
As if CISOs don’t have enough to focus on, here’s a few more items that should be top of mind. KAR Global CISO Leon Ravenna dives into cyber insurance and why D&O requirements may be on the horizon, regulatory burdens and what to expect…
Exploits, Security Bloggers, Security Vendor News, Vulnerabilities
UPDATED: Cybereason Log4Shell Vaccine Offers Permanent Mitigation Option for Log4j Vulnerabilities (CVE-2021-44228 and CVE-2021-45046)
by Yonatan Striem-Amit •
UPDATE 12/17/21: The Logout4Shell Vaccine has been updated to add a persistent option in addition to the existing one which reverted upon server restart.
The previous version of the Vaccine used the Log4Shell vulnerability to remove the JN…
Europe, Global Security News, North America
Cl0p Ransomware Gang Tries to Topple the House of Cards
by Lior Div •
When I wrote the introduction for our recent report Organizations at Risk: Ransomware Attackers Don’t Take Holidays, I described current factors and trends with the potential to disrupt the upcoming holiday season.
The post Cl0p Ransomware Gang …
Europe, Global Security News, North America
CISO Stories Podcast: Which Approach Wins – Compliance or Risk?
by CISO Stories Podcast •
Cybersecurity programs have evolved from the early days of compliance with regulations. Regulations are important and provide the necessary motivation for many organizations to implement security controls that may not otherwise be present, but is…
North America
A Journey in Organizational Resilience: Insider Threats
by George Platsis •
Very much like privacy concerns, insider threats may not be the first issue to come to mind when building an enterprise cyber resilience plan. However, they should be. Here is why: because as we noted in the first piece of this series, you want to be able to bend while others break. An insider threat […]
The post A Journey in Organizational Resilience: Insider Threats appeared first on Security Intelligence.
Security Bloggers, Security Vendor News
In Today’s Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical
by Evan Schuman •
The enterprise security world changed forever in March 2020, with almost all enterprises flipping from 90 percent of people and information flow happening inside to 90 percent (or more) happening outside. The implications of this, coupled with sharp increases in cloud and IoT, has forced CISOs to deal with an environment completely different than what […]
The post In Today’s Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical appeared first on Infoblox Blog.
Europe, Global Security News, North America
Webinar November 18th: Anatomy of a Ransomware Attack
by Cybereason Security Team •
Join Cybereason CEO and co-founder Lior Div and CSO Sam Curry as they break down the anatomy of a ransomware attack. Learn how Cybereason enables defenders to protect themselves and orchestrate the best ransomware defenses.
The post Webinar Novem…
Europe, Global Security News, North America
What is XDR? Understanding Extended Detection and Response
by Cybereason Security Team •
XDR, shorthand for the product category of Extended Detection and Response, is a security approach that extends the power of EDR (Endpoint Detection and Response) capabilities to create integrated detection and response across not only endpoints,…
Europe, Global Security News, North America
How Does XDR Solve the IT Infrastructure Visibility Gap?
by Cybereason Security Team •
Network visibility is a persistent problem for organizations. Back in 2019, Business Wire shared the results of a survey in which 65% of respondents said that a lack of visibility into their organizations’ IT security infrastructure was the top o…
Europe, Global Security News, North America
Threat Analysis Report: PrintNightmare and Magniber Ransomware
by Cybereason Global SOC Team •
The Cybereason Global Security Operations Center (GSOC) issues Cybereason Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against t…
Europe, Global Security News, North America
How XDR is Changing Security for the Better
by Cybereason Security Team •
The future of XDR (Extended Detection and Response) looks bright. As reported by MarketResearch.com, analyst firm Frost & Sullivan predicts that the global XDR market will grow by triple digits in the coming years. This optimistic prediction …
Europe, Global Security News, North America
Webinar: Inside the REvil Ransomware – Pick Your Path
by Cybereason Security Team •
Today’s ransomware actors are operating to devastating effect as evidenced by the Colonial Pipeline and JBS attacks, showing that a successful attack can disrupt any business.
The post Webinar: Inside the REvil Ransomware – Pick Your Path a…
Europe, Global Security News, North America
CISO Stories Podcast: Communications Before, During and After a Breach
by CISO Stories Podcast •
Figuring out what to do after a breach is the wrong time to start the planning process. Communications strategies must be in place well beforehand and there are many benefits to the cybersecurity program for implementing these strategies in advan…
Europe, Global Security News, North America
Busted: Taking Down Ransomware Attackers
by Cybereason Security Team •
Ransomware has been big news this year. In March, the REvil/Sodinokibi ransomware gang infected Acer and demanded $50 million—the highest ransom demand from any ransomware group up to that point. That same gang then turned around a month later an…