Your backup data sets can become a treasure trove for advanced threat detection

Despite ever increasing investments in security technologies, data breaches and cyber incidents are increasing at a relentless rate, and the problem is projected to keep getting worse. Industry research shows that attacks from ransomware, data compromi… Continue reading Your backup data sets can become a treasure trove for advanced threat detection

DevOps and digital transformation initiatives are creating insecure apps

WhiteHat Security released its 2018 Application Security Statistics Report, “The Evolution of the Secure Software Lifecycle,” which identifies the security vulnerabilities and challenges introduced into the enterprise through traditional applications, … Continue reading DevOps and digital transformation initiatives are creating insecure apps

Global spending on security solutions to reach $133.7 billion in 2022

Worldwide spending on security-related hardware, software, and services is forecast to reach $133.7 billion in 2022, according to IDC. Although spending growth is expected to gradually slow over the 2017-2022 forecast period, the market will still deli… Continue reading Global spending on security solutions to reach $133.7 billion in 2022

Bridging the priority gap between IT and security in DevOps

Let’s start with a test. Suppose that you manage a corporate network gateway across which a critical programmed transaction is scheduled to occur in exactly one hour. Suppose further that the firewall protecting this gateway is functionally misbehaving… Continue reading Bridging the priority gap between IT and security in DevOps

In terms of main threat actors, expectation rarely matches reality

Netwrix conducted a study of the major IT risks that are significant for most organizations and assessed respondents’ readiness to withstand cyber threats. The report is based on the feedback of 1,558 organizations of various sizes from many different … Continue reading In terms of main threat actors, expectation rarely matches reality

You should prepare for the next mega data breach

As of September 2018, it’s been one year since the historical Equifax mega data breach that impacted nearly half of all consumers in the U.S. Since this monumental invasion of personal data, fraudsters have shown little to no notion of slowing down as … Continue reading You should prepare for the next mega data breach

Global information security spending to exceed $124 billion in 2019

Worldwide spending on information security products and services will reach more than $114 billion in 2018, an increase of 12.4 percent from last year, according to the latest forecast from Gartner. In 2019, the market is forecast to grow 8.7 percent t… Continue reading Global information security spending to exceed $124 billion in 2019

Making informed decisions: The importance of data driven security

When deciding what product to buy, the information the vendor offers about the product is helpful, but not nearly enough: you need to analyze individual product results and peruse comparative reports to make the right choice for your organization. In t… Continue reading Making informed decisions: The importance of data driven security

Salesforce promotes COO Keith Block to co-CEO alongside founder Marc Benioff

Salesforce is moving to a two CEO model after it promoted executive Keith Block, who was most recently COO, to the position of co-CEO. Block will work alongside Salesforce’s flamboyant founder, chairman and CEO (now co-CEO) Marc Benioff, with both reporting directly to the company’s board. Block joined Salesforce five years ago after spending 25 […] Continue reading Salesforce promotes COO Keith Block to co-CEO alongside founder Marc Benioff

Preventing IDN homograph attacks from harming your brand/reputation

Phishing is, by and large, the most often used attacker tactic to trick victims into sharing useful information such as login credentials. More often than not, that means directing them to spoofed login web pages posing as the real deal. Before the adv… Continue reading Preventing IDN homograph attacks from harming your brand/reputation