When it comes to cybersecurity, perfection is the enemy of progress

In information security, perfection is the enemy of progress, says Lenny Zeltser, VP of Product at Axonius. But It’s one thing to know about this maxim, and another to internalize its wisdom through trial and error. “I remember striving to build … Continue reading When it comes to cybersecurity, perfection is the enemy of progress

Anatomy of a ransomware attack: How attackers gain access to unstructured data

Ransomware isn’t a new phenomenon, but it’s effects are starting to be felt more widely, and more deeply than ever before. Behemoths like Sony, Nissan, FedEx, Kraft Foods and Deutsche Bank have all been hit in recent years, and the list is growing. The… Continue reading Anatomy of a ransomware attack: How attackers gain access to unstructured data

Why simplifying cybersecurity is essential for mutual fund boards of directors

Imagine if you were tasked with the understanding of an element of your job outside of your job description, and that the understanding of this element, if not done correctly, may result in dramatic losses and/or reputational risk for your organization… Continue reading Why simplifying cybersecurity is essential for mutual fund boards of directors

Why businesses need IAM to push their zero trust frameworks forward

Many organizations are finding themselves between a rock and a hard place when it comes to the security of their digital transformation strategies. On the one hand, the number of data breaches continue to increase and damages stemming from cybercrime h… Continue reading Why businesses need IAM to push their zero trust frameworks forward

How past threats and technical developments influence the evolution of malware

If we want to anticipate how malware will evolve in the near future, we have to keep two things in mind: past threats and current technical developments. “The evolution of malware-related threats is like a sine wave movement, re-infused by new te… Continue reading How past threats and technical developments influence the evolution of malware

Beating biometrics: Why biometric authentication alone is not a panacea

As we witness the accelerating use of biometrics throughout our lives, we must pause to consider the risks and ramifications of doing so as technological advancements make it increasingly easy to mimic, manipulate and manufacture biometry. As the world… Continue reading Beating biometrics: Why biometric authentication alone is not a panacea

Researchers develop a technique to vaccinate algorithms against adversarial attacks

A set of techniques to effectively vaccinate algorithms against adversarial attacks have been developed by researchers from CSIRO’s Data61. Algorithms ‘learn’ from the data they are trained on to create a machine learning model that c… Continue reading Researchers develop a technique to vaccinate algorithms against adversarial attacks

Countering industrial cyberthreats with secure, standards-based, licensed wireless networks

Over the past few years, cyber threats aimed at a number of critical infrastructure targets have drawn our attention to the security of mission critical networks. These threats have included power grids in Ukraine and Ireland, U.S. energy companies and… Continue reading Countering industrial cyberthreats with secure, standards-based, licensed wireless networks