Most organizations are at an elevated risk of attack

The risk of cyberattacks has increased in the last year. According to a Trend Micro survey, 80% of global organizations report they are likely to experience a data breach that impacts customer data in the next 12 months. The findings come from Trend Mi… Continue reading Most organizations are at an elevated risk of attack

Increasing speed of vulnerability scans ultimately increases security fixes overall

Next-generation static application security testing (SAST) and intelligent software composition analysis (SCA) can increase the speed of vulnerability scans and narrow their scope to highlight reachable issues, a ShiftLeft report reveals. This ultimate… Continue reading Increasing speed of vulnerability scans ultimately increases security fixes overall

CyberCops program: ROTC students as future cybersecurity gatekeepers

Not so long ago, a strong password felt mighty enough to keep you safe and your computer data private. But we now live amid heightened risks in malware, phishing, spearphishing and denial-of-service attacks. Even scarier, it is possible for computer te… Continue reading CyberCops program: ROTC students as future cybersecurity gatekeepers

Blocked DDoS attack volumes up, tech, healthcare and finance most targeted

Second quarter blocked DDoS attack volumes were up more than 40% compared to the same period in 2020, a Radware report reveals. The report provides an overview of DDoS attack trends by industry, as well as across applications and attack types. Notable … Continue reading Blocked DDoS attack volumes up, tech, healthcare and finance most targeted

Cybercriminals are manipulating reality to reshape the modern threat landscape

VMware released a report which analyzes how cybercriminals are manipulating reality to reshape the modern threat landscape. The report found a drastic rise in destructive attacks, where adversaries deploy advanced techniques to deliver more targeted, s… Continue reading Cybercriminals are manipulating reality to reshape the modern threat landscape

Supply chain attacks expected to multiply by 4 in 2021

Supply chain attacks have been a concern for cybersecurity experts for many years because the chain reaction triggered by one attack on a single supplier can compromise a network of providers. Malware is the attack technique that attackers resort to in… Continue reading Supply chain attacks expected to multiply by 4 in 2021

73% of healthcare organizations have now adopted DevOps

The last year was challenging for every business sector, and none more than healthcare which was under enormous pressure to provide care while changing the way many services are delivered. According to data from a Redgate Software report, the importanc… Continue reading 73% of healthcare organizations have now adopted DevOps

SAP applications more vulnerable than users might think

Many application owners are unaware of how vulnerable their SAP applications may be, significantly increasing the risks to their core enterprise systems. This is the overall conclusion of a Turnkey Consulting and Onapsis report. Only 14.3% of responden… Continue reading SAP applications more vulnerable than users might think

How tech pros perceive the evolving state of risk in the business environment

SolarWinds released a report which examines how technology professionals perceive their organizations’ risk management and mitigation readiness after a year of rapid transformation fueled by the global pandemic. The study analyzes the state of risk wit… Continue reading How tech pros perceive the evolving state of risk in the business environment

How to prevent corporate credentials ending up on the dark web

A little over $3,000 — that’s how much stolen corporate network credentials tend to go for on the dark web. Although the exact asking price for an individual’s credentials may depend on several factors, like how much revenue their enterprise make… Continue reading How to prevent corporate credentials ending up on the dark web