The top trends CSPs and enterprises will face in 2021 and beyond

Like most everyone else, our way of working has been significantly affected by the COVID-19 pandemic. Fortunately, one thing that can’t be stopped, even if it may have been slowed, is the rollout of 5G, which remains a high priority around the world. A… Continue reading The top trends CSPs and enterprises will face in 2021 and beyond

Lesson from Lockdowns: Crucial to Scale-Up Cybersecurity Services

The COVID-19 pandemic and governmental movement restrictions have led to an increased dependency on online services for individuals and businesses alike. Cybercriminals quickly identified this trend as an opportunity for gaining profits. They responded… Continue reading Lesson from Lockdowns: Crucial to Scale-Up Cybersecurity Services

‘Tis the Season for Nonprofit Cybersecurity Risks to Reach New Heights

The period between Christmas and New Year’s Day has long been the time people give to charities the most, making the charities themselves attractive targets for cyber criminals. Because the events of 2020 will likely boost existing trends, nonprofit cybersecurity challenges may be greater than ever this year — even as groups find themselves with […]

The post ‘Tis the Season for Nonprofit Cybersecurity Risks to Reach New Heights appeared first on Security Intelligence.

Continue reading ‘Tis the Season for Nonprofit Cybersecurity Risks to Reach New Heights

Why Linux Should Factor Into Your Security Strategy

Linux is a pervasive operating system—and for good reason. It’s lightweight, flexible, multi-architecture supportive and open source, all leading to loads of opportunity. Today, Linux-based systems run servers, mainframes, routers, smart cars, cloud w… Continue reading Why Linux Should Factor Into Your Security Strategy

Cybercriminals Shift Tactics Against OT Networks

Most of the focus on security during the COVID-19 pandemic has been on employees working from home, accessing applications in the cloud or running on local servers in an office. However, a survey of 1,100 IT and operations technology (OT) professional… Continue reading Cybercriminals Shift Tactics Against OT Networks

Pandemic Leads to Increase in Human-Like Attacks

A new study shows a marked increase in cyberattacks that mimic human behavior The pandemic didn’t just send millions of workers from their corporate offices to their dining room table; it also created an increase in overall online transactions. Resear… Continue reading Pandemic Leads to Increase in Human-Like Attacks

Election cyberthreats have been ‘blocked, minimal or easily mitigated,’ federal agencies remind voters

For the second time in a week, U.S. national security agencies have publicly reassured voters that election systems are being guarded from hacking and that the integrity of the vote is intact. The FBI and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency “have not identified any threats, to date, capable of preventing Americans from voting or changing vote tallies for the 2020 elections,” the agencies said in a statement published Thursday. “[A]ttempts by cyber actors to compromise election infrastructure could slow but not prevent voting,” the agencies said, adding that any threats to date have “remained localized and were blocked, minimal or easily mitigated.” The announcement follows an advisory from the agencies on Tuesday warning that foreign actors could seize on delays in the reporting of election results to spread disinformation aimed at undermining confidence in the vote. The statements show how federal agencies, which have worked […]

The post Election cyberthreats have been ‘blocked, minimal or easily mitigated,’ federal agencies remind voters appeared first on CyberScoop.

Continue reading Election cyberthreats have been ‘blocked, minimal or easily mitigated,’ federal agencies remind voters

Breach Prevention Starts with Knowing Your Immediate Adversary

The post Breach Prevention Starts with Knowing Your Immediate Adversary appeared first on Digital Defense, Inc..
The post Breach Prevention Starts with Knowing Your Immediate Adversary appeared first on Security Boulevard.
Continue reading Breach Prevention Starts with Knowing Your Immediate Adversary

Financial Sector Cybersecurity: How do you compare to your peers?

The post Financial Sector Cybersecurity: How do you compare to your peers? appeared first on Digital Defense, Inc..
The post Financial Sector Cybersecurity: How do you compare to your peers? appeared first on Security Boulevard.
Continue reading Financial Sector Cybersecurity: How do you compare to your peers?

An executive perspective: The evolution of security and networking

Government and critical infrastructure organizations can no longer deliver services at scale and still defend against today’s cybersecurity threats without rethinking their approach to security. Ken Xie, cofounder and CEO of Fortinet, sits down with us to discuss what that approach must look like and which primary cababilities organizations must integrate into their operations to more effectively secure their enterprises.  CyberScoop: How have you seen the arc of cybersecurity evolving over the last decade to where enterprises and government agencies are today? Ken Xie: Today, data and applications move between different users, devices and networks, making visibility and control more difficult. The trusted zone has disappeared and the traditional perimeter extends through and with mobile end-user and IoT devices, even beyond the entire infrastructure. At the same time, digital innovation is continuously introducing new edges and fragmenting the perimeter even further. Of course, cloud adoption plays a critical role in […]

The post An executive perspective: The evolution of security and networking appeared first on CyberScoop.

Continue reading An executive perspective: The evolution of security and networking