Privileged credential abuse is involved in 74% of data breaches

Most IT decision makers are not prioritizing Privileged Access Management (PAM) practices and solutions, despite knowing privileged credential abuse is involved in almost three out of every four breaches, according to Centrify. The survey of 1,000 IT d… Continue reading Privileged credential abuse is involved in 74% of data breaches

Here are all of the election security offerings from private companies

With time running out before the midterm elections in November, many of the state and local election offices charged with running the polls are scrambling to secure their systems and protect them from cyberthreats. Much of their efforts are supported or guided by the Department of Homeland Security. The agency is providing jurisdictions with cybersecurity assessments, live exercises, penetration testing and facilitating information sharing, among other things. States also have a collective $380 million fund from Congress that they can use for election security and other improvements. Meanwhile, a number of technology companies have taken notice of the election security issue and are offering assistance to election-related entities. Some of the offerings are free, while others are discounted. Some of companies, like DHS, focus on helping the state and local offices that run the country’s elections. Others are offering their services to political organizations, like campaigns and political action committees […]

The post Here are all of the election security offerings from private companies appeared first on Cyberscoop.

Continue reading Here are all of the election security offerings from private companies

Adopting a Zero Trust approach is the best strategy to control access

A new study conducted by Forrester Consulting found that organizations powering Zero Trust Security with next-gen access solutions reported twice the confidence to accelerate new business models and customer experiences. The study of 311 IT decision-ma… Continue reading Adopting a Zero Trust approach is the best strategy to control access

26,000 electronic devices are lost on London Transport in one year

Commuters lost over 26,000 electronic devices on London’s Transport for London (TFL) network last year, new research from the think tank Parliament Street has revealed. The findings reveal that 26,272 devices were reported lost on the network of tubes,… Continue reading 26,000 electronic devices are lost on London Transport in one year

SolarWinds, Mimecast, & AT&T – Enterprise Security Weekly #98

This week, Thoma Bravo to buy majority stake in cybersecurity firm Centrify, SolarWinds acquires real-time threat-monitoring service Trusted Metrics, Mimecast acquires Ataata, AT&T to acquire AlienVault, and more on this episode of Enterprise Secur… Continue reading SolarWinds, Mimecast, & AT&T – Enterprise Security Weekly #98

Unrestricted access to systems and files exposes organizations to cybercrime

UK organisations are leaving themselves vulnerable to cybercrime with over a third of 18-24-year-olds able to access any files on their company network, and only one in five having to request permission to access specific files. Less than half (43%) ar… Continue reading Unrestricted access to systems and files exposes organizations to cybercrime

Dixons Carphone breach: Personal and payment card info compromised

Dixons Carphone, the multinational electrical and telecommunications retailer that holds over 2,000 stores across the UK, Ireland and mainland Europe, has suffered a security breach. About the breach The company discovered the “unauthorised acces… Continue reading Dixons Carphone breach: Personal and payment card info compromised