While IT budget allocations for cybersecurity are significant, data breaches still very common

While IT security decision makers often consider cyberattacks a serious concern and are allocating a significant share of their IT budget to address their cybersecurity challenges, data breaches have still been uncomfortably commonplace, an INTRUSION s… Continue reading While IT budget allocations for cybersecurity are significant, data breaches still very common

Audit process or project changes leading to control gaps, creating risks

A survey of 200 audit business partners revealed that 56% of respondents said they were facing more changes in the last two years, and a large majority agreed these changes were both bigger (81%) and faster (74%), according to Gartner. The pace of chan… Continue reading Audit process or project changes leading to control gaps, creating risks

Cyberattacks on the rise, organizations increasingly interested in defensive technologies

Cyberattacks against enterprise infrastructure are on the rise in the U.K. as digital transformation expands the digital footprints—and the potential attack surfaces—of many organizations, according to a report published by Information Services Group (… Continue reading Cyberattacks on the rise, organizations increasingly interested in defensive technologies

The challenges healthcare CISOs face in an evolving threat landscape

Organizations in the healthcare sector – and especially those engaged in delivering healthcare services – have always been juicy targets for cyber attackers. But while in the past they were mostly after patients’ personal, health and … Continue reading The challenges healthcare CISOs face in an evolving threat landscape

The evolution of identity-first security

Earlier this year, Gartner named identity-first security as one of the top security and risk management trends for 2021. Companies have been moving away from traditional LAN edge approaches, and now identity lies at the center of security strategies. M… Continue reading The evolution of identity-first security

World Health Organization CISO suggests a holistic approach to cybersecurity

Flavio Aggio, CISO at the World Health Organization, has had a challenging year. Since the onset of the COVID-19 pandemic, the WHO has become a significant target for cybercriminals, and cyber attacks against the organization have skyrocketed. He recen… Continue reading World Health Organization CISO suggests a holistic approach to cybersecurity

SMBs increasingly vulnerable to ransomware, despite the perception they are too small to target

Acronis released a report which gives an in-depth review of the cyberthreat trends the company’s experts are tracking. The report warns that small and medium-sized businesses (SMBs) are at particular risk based on the attack trends seen during th… Continue reading SMBs increasingly vulnerable to ransomware, despite the perception they are too small to target

Cyber intrusion activity volume jumped 125% in H1 2021

The volume of cyber intrusion activity globally jumped 125% in the first half of 2021 compared with the same period last year, according to the Cyber Investigations, Forensics & Response (CIFR) mid-year update from Accenture. Cyber intrusion activ… Continue reading Cyber intrusion activity volume jumped 125% in H1 2021

The value of PII and how it still fuels malign activities in the digital ecosystem

The COVID-19 pandemic engendered new vulnerabilities in the digital ecosystem for threat actors to exploit, resulting in items like vaccines, fraudulent vaccine certificates, and other COVID-19 related items being sold in dark marketplaces and undergro… Continue reading The value of PII and how it still fuels malign activities in the digital ecosystem

How to harden Kubernetes systems and minimize risk

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) released a report which details threats to Kubernetes environments and provides configuration guidance to minimize risk. What is Kubernetes? Kubernetes i… Continue reading How to harden Kubernetes systems and minimize risk