DDoS attacks increase 341% amid pandemic

During the pandemic, cyber attackers targeted industries providing connectivity, services and entertainment to populations forced to shelter-in-place, resulting in a 341% year-over-year increase in distributed denial-of-service (DDoS) attacks, accordin… Continue reading DDoS attacks increase 341% amid pandemic

How to Mitigate Risk Against Operational Technology (OT)

Operational technology, or OT, is hardware and software technologies that monitor and control a variety of physical operations including, but not limited to processes, devices, and even various infrastructures like public rail transportation. As OT bec… Continue reading How to Mitigate Risk Against Operational Technology (OT)

Mitigating third-party risks with effective cyber risk management

Third-party engagement has steadily become an essential part of business operations for many organizations, enlisted for all kinds of products and services across nearly all sectors, regardless of size, geographical location or type of industry. But be… Continue reading Mitigating third-party risks with effective cyber risk management

Organizations leveraging Microsoft Teams exposed to potential risk

A survey conducted by Exec Survey and iGov Survey, reveals how over 200 unique organizations in the U.K. enabled seamless business continuity amid rapid societal change, where they face security challenges today, and what policies and procedures they a… Continue reading Organizations leveraging Microsoft Teams exposed to potential risk

How can companies prioritize contact center security?

Security is front of mind for a lot of organizations these days, especially due to the 400% increase in cyberattacks since the pandemic started. Notable and alarming attacks include those on the federal government by nation-state threat actors using wi… Continue reading How can companies prioritize contact center security?

Most mobile finance apps vulnerable to data breaches

77% of financial apps have at least one serious vulnerability that could lead to a data breach, an Intertrust report reveals. This report comes at a time where finance mobile app usage has rapidly accelerated, with the number of user sessions in financ… Continue reading Most mobile finance apps vulnerable to data breaches

Application security approaches broken by rising adoption of cloud-native architectures

The rising adoption of cloud-native architectures, DevOps, and agile methodologies has broken traditional approaches to application security, a survey of 700 CISOs by Coleman Parkes reveals. As organizations shift more responsibility “left”… Continue reading Application security approaches broken by rising adoption of cloud-native architectures

Guidance to help cyber threat intelligence analysts apply MITRE ATT&CK

CISA has partnered with the Homeland Security Systems Engineering and Development Institute (HSSEDI), which worked with the MITRE ATT&CK team, to issue guidance to help cyber threat intelligence analysts make better use of MITRE ATT&CK. MITRE… Continue reading Guidance to help cyber threat intelligence analysts apply MITRE ATT&CK

IT service desks lacking user verification policy, putting businesses at risk

48% of organizations don’t have a user verification policy in place for incoming calls to IT service desks, according to Specops Software. The information was uncovered as part of a survey of more than 200 IT leaders from the private and public sectors… Continue reading IT service desks lacking user verification policy, putting businesses at risk

Cyberattacks target the anywhere workforce, legacy security systems can’t provide protection

VMware released a report based on an online survey of 3,542 CIOs, CTOs and CISOs in December 2020 from across the globe. The report explores the impact of cyberattacks and breaches on organizations and details how security teams are adapting to these c… Continue reading Cyberattacks target the anywhere workforce, legacy security systems can’t provide protection