WAFs can’t give organizations the security they need

Cymulate reveals that web application firewalls are the least effective security solutions, making them prime target for adversaries and high risk points for organizations. Consequences of the ineffectiveness of web application firewalls Overall unique… Continue reading WAFs can’t give organizations the security they need

Traditional MFA is creating a false sense of security

A report from HYPR and Cybersecurity Insiders, reveals that despite the zero trust initiative, many organizations are still highly exposed to credential attacks due to insufficient multi-factor authentication (MFA) methods and overall lack of urgency a… Continue reading Traditional MFA is creating a false sense of security

Qualys Context XDR: Bringing context to an organization’s security efforts

Cybersecurity has become more complex than ever, allowing cybercriminals to access organizations through many different routes. To help incident response and threat hunting teams navigate this complex environment, Qualys has unveiled its Qualys Context… Continue reading Qualys Context XDR: Bringing context to an organization’s security efforts

Energy, oil and utility sector most likely to pay ransoms

CyberSaint announced the release of a report which identifies which sectors pay the most in ransom, have the propensity to pay and delves into the future of ransomware. Ransomware attacks have targeted and inflicted damage at all levels of the governme… Continue reading Energy, oil and utility sector most likely to pay ransoms

The importance of implementing a zero trust strategy

Optiv has published a report based on a recent survey of cybersecurity leaders that highlights the critical importance of implementing zero trust as an effective way to reduce cyber risk. Respondents cited zero trust as one of the most effective securi… Continue reading The importance of implementing a zero trust strategy

PCI SSC and the National Cybersecurity Alliance issue bulletin to highlight ransomware threat

The PCI Security Standards Council (PCI SSC) and the National Cybersecurity Alliance issued a joint bulletin on the increasing threat of ransomware attacks. What is the threat? Ransomware attacks have been front and center in the news over the past yea… Continue reading PCI SSC and the National Cybersecurity Alliance issue bulletin to highlight ransomware threat

Log4j exploitation risk is not as high as first thought, cyber MGA says

When the Log4Shell vulnerability (CVE-2021-44228) was publicly revealed in December 2021, CISA Director Jen Easterly said that it is the “most serious” vulnerability she has seen in her decades-long career and it could take years to address. It’s… Continue reading Log4j exploitation risk is not as high as first thought, cyber MGA says

The most common cyber gaps threatening supply chain security

Panorays has identified the top five most common cyber gaps among third-party organizations over 2021. Analyzing data gathered from cyber posture evaluations of tens of thousands of vendors across various industries, Panorays pinpointed compromised cre… Continue reading The most common cyber gaps threatening supply chain security

Tips to mitigate public-key cryptography risk in a quantum computing world

Quantum computing is poised to transform the industry over the next decade. With its promise of breakthrough speed and power, it’s easy to understand why there is so much hype around this new technology. But we must also consider the new cybersecurity … Continue reading Tips to mitigate public-key cryptography risk in a quantum computing world

Why the C-suite should focus on understanding cybersecurity and investing appropriately

Trend Micro has published a research revealing that persistently low IT/C-suite engagement may imperil investments and expose organizations to increased cyber risk. Over 90% of the IT and business decision makers surveyed expressed particular concern a… Continue reading Why the C-suite should focus on understanding cybersecurity and investing appropriately