Steady rise in severe web vulnerabilities

Invicti Security released a research which reveals a rise in severe web vulnerabilities and the need for executive leaders to intertwine their application security and digital transformation efforts to reduce risk. The report examines web vulnerabiliti… Continue reading Steady rise in severe web vulnerabilities

How many steps does it take for attackers to compromise critical assets?

The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid environments. Findings from the report incorporate insights from nearly two million endpo… Continue reading How many steps does it take for attackers to compromise critical assets?

Hybrid threat model: Watch out for the unhappy employee

In this interview with Help Net Security, James Turgal, VP of Cyber Risk, Strategy and Board Relations at Optiv Security, talks about the hybrid threat model, a new approach that leverages social media to launch cyberattacks on organizations. Threats a… Continue reading Hybrid threat model: Watch out for the unhappy employee

49% of small medical practices don’t have a cyberattack response plan

Sophisticated cyberattacks are crippling healthcare providers by posing a threat to core functions and patient privacy, according to Software Advice survey. Findings reveal that 22% of small practices and 45% of large practices have experienced a ranso… Continue reading 49% of small medical practices don’t have a cyberattack response plan

New and less known cybersecurity risks you should be aware of

In this interview with Help Net Security, Zur Ulianitzky, Head of Security Research at XM CYber, gives insights on new and less talked about cybersecurity risks organizations should look out for, and what should they do keep themselves secure and prote… Continue reading New and less known cybersecurity risks you should be aware of

Cloud native application security is a critical priority, risk perception is worryingly low

Aqua Security has announced the results of a study which reveals that UK organizations have a long road ahead when it comes to understanding, planning and deploying their cloud native security strategies. The survey gathered insights from 100+ cloud pr… Continue reading Cloud native application security is a critical priority, risk perception is worryingly low

Not enough businesses have a formal ransomware plan in place

A research from Thales has found that malware, ransomware and phishing continues to plague global organizations. In fact, 21% have experienced a ransomware attack in the last year; with 43% of those experiencing a significant impact on operations. Firs… Continue reading Not enough businesses have a formal ransomware plan in place

Trends, threats and techniques that comprised the 2021 threat landscape

Ransomware dominated the threat landscape in 2021, with groups adopting new techniques such as double extortion and “as-a-service” models to evade detection and maximize their earnings, a Red Canary report reveals. The report explores the top 10 threat… Continue reading Trends, threats and techniques that comprised the 2021 threat landscape

Strengthening third-party vendor programs in times of crisis and beyond

The ongoing global turmoil has tested the supply chain across industries in a myriad of ways – from strained resources and remote workflows to security concerns and more. Sustaining a resilient supply chain is one area where many organizations have see… Continue reading Strengthening third-party vendor programs in times of crisis and beyond