Why are current cybersecurity incident response efforts failing?

Business-critical applications, such as enterprise resource planning (ERP) systems provided by SAP and Oracle, are considered the crown jewels of the enterprise. These assets hold an organization’s most valuable data: from confidential financial inform… Continue reading Why are current cybersecurity incident response efforts failing?

Most organizations do not follow data backup best practices

Apricorn announced new findings from a survey, which revealed that while the majority organizations have data backup plans in place, data for many are at risk. Nearly 400 veteran IT security practitioners were surveyed, in industries such as healthcare… Continue reading Most organizations do not follow data backup best practices

How confident are companies in managing their current threat exposure?

Crossword Cybersecurity has released a report based on the findings of a survey of over 200 CISOs and senior UK cyber security professionals. The paper reveals companies are more concerned and exposed to cyber threats than ever before, with 61 percent … Continue reading How confident are companies in managing their current threat exposure?

Where is attack surface management headed?

Reactive cyber defense is a losing strategy. It’s something that’s been tolerated for many decades, but isn’t it more cost-effective, better for the brand, and more optimal to align with a proactive approach? Attack surface management (ASM) is only the… Continue reading Where is attack surface management headed?

Why cyber security can’t just say “no“

There was a time, not long ago, when there were only so many ways of accomplishing an information technology task. Whether you were building a website, setting up a new computer, or installing a piece of software, your options were limited — if t… Continue reading Why cyber security can’t just say “no“

The SaaS-to-SaaS supply chain is a wild, wild mess

Cloud migration and IT democratization have created a continuously growing network of interconnected business applications, integrated to digitize and automate business workflows. Employees in the digital transformation age are now compelled to choose … Continue reading The SaaS-to-SaaS supply chain is a wild, wild mess

Why are DDoS attacks so easy to launch and so hard to defend against?

DDoS attacks are an underappreciated residual risk for most organizations today. While most people are concerned about ransomware, it typically takes a ransomware attacks months to develop, whereas DDoS attacks are very sudden and may result in a compl… Continue reading Why are DDoS attacks so easy to launch and so hard to defend against?

Ransomware works fast, you need to be faster to counter it

Since the pandemic hit and organizations had to quickly adjust to widespread remote work and stand up hybrid environments, ransomware gangs have been having a field day. In this video for Help Net Security, Chuck Everette, Director of Cybersecurity Adv… Continue reading Ransomware works fast, you need to be faster to counter it

Password reuse is rampant among Fortune 1000 employees

SpyCloud published an annual analysis of identity exposure among employees of Fortune 1000 companies in key sectors such as technology, finance, retail and telecommunications. Drawing on a database of over 200 billion recaptured assets, researchers ide… Continue reading Password reuse is rampant among Fortune 1000 employees

How to set up a powerful insider threat program

Security spend continues to focus on external threats despite threats often coming from within the organization. A recent Imperva report (by Forrester Research) found only 18 percent prioritized spend on a dedicated insider threat program (ITP) compare… Continue reading How to set up a powerful insider threat program