Push to Digitalization Boosts Cybersecurity Investment

According to a recent Crunchbase report, 2020 was a record year for cybersecurity investments, with more than $7.8 billion invested in the industry globally. The pandemic accelerated digital transformation for many companies, forcing organizations to … Continue reading Push to Digitalization Boosts Cybersecurity Investment

Diversity in the Cybersecurity Workforce

Like most technology workforce segments, the cybersecurity diversity issue is a very acute problem: there simply isn’t nearly enough representation of diverse backgrounds in cybersecurity roles, from security operations center (SOC) analysts all… Continue reading Diversity in the Cybersecurity Workforce

Should You Hire a Computer Forensics Specialist?

The need for computer and digital forensics experts is growing significantly due to the increase in cyberattacks, with digital forensics skillsets becoming a critical element in helping IT security teams learn from security incidents. This type of kno… Continue reading Should You Hire a Computer Forensics Specialist?

Fileless Malware, Endpoint Attacks on the Rise

Cybercriminals are increasingly leveraging fileless malware, cryptominers and encrypted attacks, targeting users both at remote locations as well as corporate assets behind the traditional network perimeter. These were among the findings of WatchGuard… Continue reading Fileless Malware, Endpoint Attacks on the Rise

Building Immunity at AppSec Insertion Points

The fundamentals of a formal, effective application security plan should start with business objectives, tools, processes and most of all, data, with the primary driver for securing applications focused on protecting data. While it is important to sur… Continue reading Building Immunity at AppSec Insertion Points

Report Finds Surge in Malware Aimed at MacOS

Malware targeting Apple’s macOS is on the rise—and fast—according to an investigation by Atlas VPN, which reported 674,273 new malware samples were found in 2020, up from just 56,556 samples detected in 2019. That’s an increase of 1,092%, with malicio… Continue reading Report Finds Surge in Malware Aimed at MacOS

IoT Security in the Wake of the Verkada Breach

The security breach of security camera startup Verkada, which gave hackers access to videos from nearly 150,000 cameras – including those in prisons, schools, hospitals and electric car giant Tesla -means organizations deploying cloud-based IoT … Continue reading IoT Security in the Wake of the Verkada Breach

Patch Management in the Post-SolarWinds Era

The SolarWinds breach, in which hackers inserted malware into software updates sent to thousands of customers and created a backdoor to their IT systems, suggests organizations need to seriously rethink patch management. Until recently, installing pat… Continue reading Patch Management in the Post-SolarWinds Era

Secure Offboarding Best Practices

The remote work conditions set up in response to the COVID-19 pandemic resulted in a host of new challenges for IT departments – one that’s often overlooked is securely offboarding employees. It’s an especially tricky task to locate … Continue reading Secure Offboarding Best Practices

Banking Apps Look to Balance Convenience, Security

Mobile banking technology is poised to become ubiquitous. Soon connecting with your banker via video will be as easy and commonplace as checking your account balance on your smartphone. In the not-so-distant future, customers will expect to always have the option to chat face-to-face with their banker either on a mobile app, from an ATM or at a kiosk or meeting room in the branch itself. With the rise of mobile banking options, protecting customer data and identity is a primary security concern for many businesses. Financial institutions have increased compliance and regulatory requirements… Continue reading Banking Apps Look to Balance Convenience, Security

Posted in SBN