To shift to data-driven security decision making: Start with the right data

We live in the age of data-driven everything. From sales to operations, and everything in-between, today’s organizations are constantly looking for ways to leverage the data they accrue – reacting more agilely, operating more efficiently, and saf… Continue reading To shift to data-driven security decision making: Start with the right data

Employees are often using devices in seriously risky ways

Since the start of the pandemic, the modern workforce has become increasingly distributed, while employers have not been able to keep up with the changes in the way employees work. As a result, many high-risk activities and human behaviors continue to … Continue reading Employees are often using devices in seriously risky ways

83% of employees continue accessing old employer’s accounts

In a recent study, Beyond Identity gathered responses from former employees across the United States, the United Kingdom, and Ireland and found 83% of employees admitted to maintaining continued access to accounts from a previous employer. The cybersec… Continue reading 83% of employees continue accessing old employer’s accounts

How challenging is corporate data protection?

Code42 released a report, conducted by Vanson Bourne, which found that cybersecurity teams are facing unprecedented challenges when it comes to protecting sensitive corporate data from exposure, leak and theft. Identified within the research are three … Continue reading How challenging is corporate data protection?

How QR code ease of use has broaden the attack surface

In this interview with Help Net Security, Neil Clauson, Regional CISO at Mimecast, talks about the threats of QR code phishing, explains the vulnerabilities of such technology and how to make sure not to fall prey to such attack. The pandemic has resur… Continue reading How QR code ease of use has broaden the attack surface

WAFs can’t give organizations the security they need

Cymulate reveals that web application firewalls are the least effective security solutions, making them prime target for adversaries and high risk points for organizations. Consequences of the ineffectiveness of web application firewalls Overall unique… Continue reading WAFs can’t give organizations the security they need

Traditional MFA is creating a false sense of security

A report from HYPR and Cybersecurity Insiders, reveals that despite the zero trust initiative, many organizations are still highly exposed to credential attacks due to insufficient multi-factor authentication (MFA) methods and overall lack of urgency a… Continue reading Traditional MFA is creating a false sense of security

Qualys Context XDR: Bringing context to an organization’s security efforts

Cybersecurity has become more complex than ever, allowing cybercriminals to access organizations through many different routes. To help incident response and threat hunting teams navigate this complex environment, Qualys has unveiled its Qualys Context… Continue reading Qualys Context XDR: Bringing context to an organization’s security efforts

Energy, oil and utility sector most likely to pay ransoms

CyberSaint announced the release of a report which identifies which sectors pay the most in ransom, have the propensity to pay and delves into the future of ransomware. Ransomware attacks have targeted and inflicted damage at all levels of the governme… Continue reading Energy, oil and utility sector most likely to pay ransoms

The importance of implementing a zero trust strategy

Optiv has published a report based on a recent survey of cybersecurity leaders that highlights the critical importance of implementing zero trust as an effective way to reduce cyber risk. Respondents cited zero trust as one of the most effective securi… Continue reading The importance of implementing a zero trust strategy