Average data breach cost has risen to $3.92 million

The cost of a data breach has risen 12% over the past 5 years and now costs $3.92 million on average, according to IBM. These rising expenses are representative of the multiyear financial impact of breaches, increased regulation and the complex process… Continue reading Average data breach cost has risen to $3.92 million

Tricking attackers through the art of deception

In cybersecurity, deception is redundant if it cannot fulfill its critical aim – to misdirect, confuse, and lure attackers into traps and dead-ends. It is the art of tricking attackers into overextending and exposing themselves. To deceive attackers, a… Continue reading Tricking attackers through the art of deception

Security or compliance? Stop choosing between them

The difference between security and compliance is more than just process. It’s philosophy and practice. Compliance can be one tactical execution of a great security strategy or potentially a bureaucratic check-the-box effort. While security and complia… Continue reading Security or compliance? Stop choosing between them

Healthcare’s blind spot: Unmanaged IoT and medical devices

From imaging to monitoring systems, infusion pumps to therapeutic lasers and life support machines, medical devices are used to improve and streamline patient care. Many of these are networked and they can be found everywhere in today’s hospitals. Depe… Continue reading Healthcare’s blind spot: Unmanaged IoT and medical devices

Securing modern web apps: A case for framework-aware SAST

If you were to write a web application entirely by yourself, it would be a rather daunting task. You would need to write the UI elements from lower-level APIs, set up and manage the database connections, manage the HTTP requests and replies, and so on…. Continue reading Securing modern web apps: A case for framework-aware SAST

How DNS firewalls can burn security teams

It’s easy to see how DNS firewalls could have thwarted 33% of data breaches. For most IT and security teams, DNS has been an afterthought. Or, worse, not even that. The research, conducted by the Global Cyber Alliance, was absolutely still worth doing…. Continue reading How DNS firewalls can burn security teams

NSS Labs test exposes weaknesses in NGFW products

Firewalls are the most widely deployed network security devices. Enterprises expect next generation firewalls (NGFWs) to prevent exploits and malware from infecting critical systems. NSS Labs 2019 NGFW Group Test NSS Labs announced the results of its 2… Continue reading NSS Labs test exposes weaknesses in NGFW products

FaceApp privacy panic: Be careful which apps you use

The privacy panic over FaceApp, the selfie-editing mobile app that makes photo subjects younger, older or turns them into members of the opposite sex, has been overblown. The (overblown) issue FaceApp is an iOS and Android app developed by Russian comp… Continue reading FaceApp privacy panic: Be careful which apps you use

True passwordless authentication is still quite a while away

The password has been one of the great inventions in the history of computing: a solution that allowed simple and effective identity and access management when the need arose for it. Unfortunately, as time passed, the downsides of using (just) password… Continue reading True passwordless authentication is still quite a while away

Skills gap remains a top barrier to SD-WAN adoption

SD-WAN security drives selection, skills gaps remain a primary obstacle to adoption, and adoption continues to rise, according to Masergy. The survey, conducted in partnership with IDG Research, analyzed responses from IT decision makers in global ente… Continue reading Skills gap remains a top barrier to SD-WAN adoption