Holidays don’t mean much to ransomware attackers

Cybereason published a global study of 1,200+ security professionals at organizations that have previously suffered a successful ransomware attack on a holiday or weekend. The study highlights the disconnect between organizational risk and preparedness… Continue reading Holidays don’t mean much to ransomware attackers

Businesses compromise on cybersecurity in favor of other goals

90% of IT decision makers claim their business would be willing to compromise on cybersecurity in favor of digital transformation, productivity, or other goals. Additionally, 82% have felt pressured to downplay the severity of cyber risks to their boar… Continue reading Businesses compromise on cybersecurity in favor of other goals

How to handle third-party security risk management

In this Help Net Security interview, Demi Ben-Ari, CTO at Panorays, talks about third-party security risk management and the repercussions of a third-party breach. He also discusses the Panorays platform that automates, accelerates and scales customers… Continue reading How to handle third-party security risk management

How to strengthen incident response in the health sector

The European Union Agency for Cybersecurity issued an analysis of the current state of development of sectoral CSIRT capabilities in the health sector since the implementation of the NIS Directive. Health organizations such as hospitals rely today on c… Continue reading How to strengthen incident response in the health sector

52% of SMBs have experienced a cyberattack in the last year

The consequences of a breach have never been more severe, with global cybercrime collectively totaling $16.4 billion each day, a Devolutions survey reveals. A recent study by IBM revealed that organizations with fewer than 500 employees had an average … Continue reading 52% of SMBs have experienced a cyberattack in the last year

The six most common threats against the device that knows you best

What is the most intimate relationship in your life—aside from your partner, your children or your parents? For many of us, it’s our mobile phone. It’s the last thing we see before sleep, and it’s usually the first thing in our hands each morning… Continue reading The six most common threats against the device that knows you best

The COVID-19 crisis has fueled the increase of cybercrime in all its forms

The accelerated digitalization related to the COVID-19 pandemic has significantly influenced the development of a number of cyber threats, according to the new edition of Europol’s Internet Organised Crime Threat Assessment. Criminals have been quick t… Continue reading The COVID-19 crisis has fueled the increase of cybercrime in all its forms

Cultural divide between IT and OT teams leaves 65% of organizations unable to secure both environments

Only 21% of organizations have achieved full maturity of their ICS/OT cybersecurity program, in which emerging threats drive priority actions and C-level executives and the board are regularly informed about the state of their OT security, a Ponemon In… Continue reading Cultural divide between IT and OT teams leaves 65% of organizations unable to secure both environments

Internal audit leaders expect new risks to emerge post-pandemic

COVID-19 stretched organizational resources and unleashed new risks on a global basis, prompting an ongoing pivot by internal audit departments to address the evolving challenges, according to a survey by AuditBoard. Cybersecurity continues to be a dau… Continue reading Internal audit leaders expect new risks to emerge post-pandemic

Healthcare organizations at risk: The attack surface is expanding

Armis released data showing the increased security risk faced by healthcare organizations and patients as an increase in connected devices creates an expanded attack surface, putting the patient journey at risk. The survey, in conjunction with Censuswi… Continue reading Healthcare organizations at risk: The attack surface is expanding