HECVAT toolkit helps higher education institutions assess cloud adoption risks

Higher education institutions are increasingly adopting cloud-based solutions in order to lower costs, improve performance and productivity, and increase flexibility and scalability. Before settling on a solution, though, they must assess it for securi… Continue reading HECVAT toolkit helps higher education institutions assess cloud adoption risks

New ransomware targets industrial control systems

With the ransomware threat is surging unstoppably in the last few years, it was just a matter of time until ICS-specific ransomware became a reality. Researchers from various security outfits have been analyzing EKANS (aka Snake) since it emerged in mi… Continue reading New ransomware targets industrial control systems

New ransomware targets industrial control systems

With the ransomware threat is surging unstoppably in the last few years, it was just a matter of time until ICS-specific ransomware became a reality. Researchers from various security outfits have been analyzing EKANS (aka Snake) since it emerged in mi… Continue reading New ransomware targets industrial control systems

How CISOs can justify cybersecurity purchases

Sometimes a disaster strikes: ransomware encrypts critical files, adversaries steal sensitive data, a business application is compromised with a backdoor… This is the stuff that CISOs’ nightmares are made of. As devastating as such incidents can be, fo… Continue reading How CISOs can justify cybersecurity purchases

Layering diverse defenses is crucial for stopping email attacks

Despite heading a company that provides a technological solution for stopping targeted email attacks, Evan Reiser, CEO of Abnormal Security, knows that technology is not the complete answer to the malicious email problem. At the same time, security awa… Continue reading Layering diverse defenses is crucial for stopping email attacks

Three principles regarding encryption you need to keep in mind

Encryption is a popular topic among security professionals and occasionally a polarizing one. Plenty of misconceptions surround the process, and these often skew the way people perceive its complexity. For instance, we’ve encountered many IT and busine… Continue reading Three principles regarding encryption you need to keep in mind

80% of successful breaches are from zero-day exploits

Organizations are not making progress in reducing their endpoint security risk, especially against new and unknown threats, a Ponemon Institute study reveals. 68% IT security professionals say their company experienced one or more endpoint attacks that… Continue reading 80% of successful breaches are from zero-day exploits

How to prioritize IT security projects

If you’re an IT security professional, you’re almost certainly familiar with that sinking feeling you experience when presented with an overwhelming number of security issues to remediate. It’s enough to make you throw your hands up a… Continue reading How to prioritize IT security projects

2019 saw more data breaches, fewer sensitive records exposed

According to a new Identity Theft Resource Center report, the number of U.S. data breaches tracked in 2019 (1,473) increased 17 percent from the total number of breaches reported in 2018 (1,257). However, 2019 saw 164,683,455 sensitive records exposed,… Continue reading 2019 saw more data breaches, fewer sensitive records exposed

2020: A year of deepfakes and deep deception

Over the past year, deepfakes, a machine learning model that is used to create realistic yet fake or manipulated audio and video, started making headlines as a major emerging cyber threat. The first examples of deepfakes seen by the general public were… Continue reading 2020: A year of deepfakes and deep deception