How do you Protect Sensitive Data in the Cloud?

We are living in the age of data. Every business processes at least some data with varying degrees of complexity, in one way or another, however, despite the rising importance of data, we are not really seeing a proportional increase in data secu… Continue reading How do you Protect Sensitive Data in the Cloud?

MSSPs Particularly Vulnerable to Cisco FDM Flaw

Of all those who potentially face a threat from the recently disclosed vulnerability on the Cisco Firepower Device Manager (FDM), MSSPs could feel the impact the hardest if adversaries decide to exploit it. “An MSSP may be operating Cisco Firepower De… Continue reading MSSPs Particularly Vulnerable to Cisco FDM Flaw

Solving the Puzzle of Global Identity Verification

With customer bases that span the globe and the growing prevalence of online fraud, financial service providers know that effective identity verification (IDV) is imperative. But meeting anti-money laundering (AML) and know your customer (KYC) complia… Continue reading Solving the Puzzle of Global Identity Verification

Getting Application Security Back on the Rails

In its Interagency Report 7695, the National Institute of Standards and Technology (NIST) defined an application as “a system for collecting, saving, processing, and presenting data by means of a computer.” This broad term covers enterprise application… Continue reading Getting Application Security Back on the Rails

Combat Ransomware With a Bottomless Cloud Mindset

In July we saw arguably one of the worst ransomware attacks in history compromise up to 1,500 businesses around the globe. Not only are these attacks worsening, but are becoming more frequent—the FBI received nearly 2,500 ransomware complaints in 2020… Continue reading Combat Ransomware With a Bottomless Cloud Mindset

Five worthy reads: The never-ending love story between cyberattacks and healthcare

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the legacy between the healthcare industry and cyberattacks, the vulnerable points in the… Continue reading Five worthy reads: The never-ending love story between cyberattacks and healthcare

How Social Norms Can Be Exploited by Scammers on Social Media

Social media platforms are excellent hunting grounds for scammers. This is where we connect with our friends or people who we have something in common with. This is precisely what scammers exploit—our connections and the trust that is afforded between … Continue reading How Social Norms Can Be Exploited by Scammers on Social Media

Ransomware 101: How to Keep Your Business Safe From the Latest Trend in Cybercrime

Ransomware. Even the name has a sinister ring, leaving no doubt as to its malicious intentions. Yes, that’s …
Read More
The post Ransomware 101: How to Keep Your Business Safe From the Latest Trend in Cybercrime appeared first on Hyperproof.
The pos… Continue reading Ransomware 101: How to Keep Your Business Safe From the Latest Trend in Cybercrime

2021 Data Security Trends in the US, UK, and Middle East

The pandemic fundamentally changed the way we work and at the same time opened a massive gap in cybersecurity. This was highlighted by a seemingly never-ending news cycle of high-profile breaches at organizations that were not equipped to adequat… Continue reading 2021 Data Security Trends in the US, UK, and Middle East

SHOCKER: Senate Says Security Sucks—Still

A Senate committee graded cybersecurity as poor among eight big agency departments. Not much has changed since the last report.
The post SHOCKER: Senate Says Security Sucks—Still appeared first on Security Boulevard.
Continue reading SHOCKER: Senate Says Security Sucks—Still