Bug Hunters Confident They Will Continue to Outperform AI: Study

Cyber security is described as a form of asymmetric warfare. One side, the defenders, have limited numbers — just the security team. The other side includes every blackhat hacker in the world — that is, many, many thousands. The blackhats only need t… Continue reading Bug Hunters Confident They Will Continue to Outperform AI: Study

Companies Say Strong Authentication Important But Still Over-Rely on Passwords

The need for improved access control is proven by empirical observation — it keeps failing. But improving access control beyond passwords suffers from a fundamental contradiction: while 98% of companies believe strong authentication is necessary for s… Continue reading Companies Say Strong Authentication Important But Still Over-Rely on Passwords

COVID-19 Fuels Phishing and Scams While BEC Attacks Evolve and Increase

Between the second and third weeks of March 2020, email scams and phishing attacks spiked by an unprecedented 436%. Such was the effect of the COVID-19 pandemic. Meanwhile, business email compromise (BEC) attacks have been less affected by the pandemic… Continue reading COVID-19 Fuels Phishing and Scams While BEC Attacks Evolve and Increase

Micro-Segmentation for Endpoints Shows Promising Defense Against Lateral Movement

Micro-segmentation combined with zero-trust access control between the segments is recommended as one of the best approaches to breach containment. This principle is now extended from the network infrastructure to the endpoint, whether that device is l… Continue reading Micro-Segmentation for Endpoints Shows Promising Defense Against Lateral Movement

Plugging the Discrepancy Between Cyber Insurance Coverage and Actual Risk

One of six ‘best practices’ highlighted by ESI ThoughtLab in a new report on Driving Cybersecurity Performance is simple: “Make more use of cybersecurity insurance to transfer risk.” Use of cyberinsurance is growing, but the insurance industry believes… Continue reading Plugging the Discrepancy Between Cyber Insurance Coverage and Actual Risk