Data Laundering Poses Privacy, Security Risks

Data laundering, like money laundering, is the act of acquiring data through an illegal means—whether that’s the dark web or a hacked/stolen database—and then taking that data and running it through a legitimate business or process in order to make th… Continue reading Data Laundering Poses Privacy, Security Risks

Ransomware Attacks Leave Lasting Damage

Organizations hit by ransomware attacks also report tightened budgets and lingering impacts on productivity, profitability and security posture, suggesting the extensive damage caused in the wake of ransomware attacks has long-lasting effects. A Keepe… Continue reading Ransomware Attacks Leave Lasting Damage

Shadow IT, Cloud-Based Malware Increase AppSec Risks

Cloud application security risks continue to rise as malware delivered by cloud applications continues to grow, according to a study by Netskope. The biannual study also highlighted the potential for critical data exfiltration tied to employees depart… Continue reading Shadow IT, Cloud-Based Malware Increase AppSec Risks

Defending Against Pervasive Spyware

The revelation that Israeli company NSO Group’s spy software Pegasus was targeting the smartphones of activists, journalists and business executives sent a shockwave through the international press. The spyware successfully infiltrated the mobile devi… Continue reading Defending Against Pervasive Spyware

Rising Threats Target Cloud Providers, Virtual Infrastructure

A growing number of cybercriminals are developing malware to conduct attacks on virtualized environments, and some are aggressively trying to exploit vulnerabilities already found in software for deploying virtual infrastructure, according to a report… Continue reading Rising Threats Target Cloud Providers, Virtual Infrastructure

Cyber Games Offer Competitive Challenges

With high-profile public and private institutions in the U.S. facing a growing threat from cybercriminals and cyberattacks, there is a growing push to prepare the next generation of potential IT security pros to meet the challenges. Cyber games are on… Continue reading Cyber Games Offer Competitive Challenges

Threat Modeling in the Age of Automation

Cybersecurity threats are rising fast, leading enterprises that build applications to look more closely at security measures built on precautionary principles, including threat modeling, which has become core to ensuring applications can withstand fut… Continue reading Threat Modeling in the Age of Automation

Phishing, Ransomware Driving Wave of Data Breaches

Data compromises have increased every month this year except May. If that trend continues, or even if there is only an average of 141 new compromises per month for the next six months, the total will still exceed the previous high of 1,632 breaches se… Continue reading Phishing, Ransomware Driving Wave of Data Breaches

Digital Habits During Pandemic Have Lasting Impact

The unexpected global pandemic left the world scrambling to maintain their daily activities and work as best they could. With stay-at-home orders that lasted for months on end—and some countries currently instituting another wave of lockdowns—most peo… Continue reading Digital Habits During Pandemic Have Lasting Impact

Remote Workforce Monitoring Brings Up Privacy Concerns

The pandemic paved the way for expanded remote work possibilities, but companies looking to ensure employees remain on the job while at home have led some to consider technologies to digitally monitor worker activity, in some cases through AI. Those i… Continue reading Remote Workforce Monitoring Brings Up Privacy Concerns