Cyberwarfare: The changing role of force

Novel malware, computer code and clandestine digital access are some of the unconventional weapons various countries are currently amassing and deploying. Whether used as a force multiplier for disinformation operations, for stand-alone projections of … Continue reading Cyberwarfare: The changing role of force

Cyberwarfare: The changing role of force

Novel malware, computer code and clandestine digital access are some of the unconventional weapons various countries are currently amassing and deploying. Whether used as a force multiplier for disinformation operations, for stand-alone projections of … Continue reading Cyberwarfare: The changing role of force

July 2020 Patch Tuesday forecast: Will the CVE trend continue?

Microsoft has averaged roughly 90 common vulnerabilities and exposures (CVE) fixes per month over the past five months. With everyone working from home and apparently focused on bug fixes, I expect this large CVE fixing trend to continue. Despite these… Continue reading July 2020 Patch Tuesday forecast: Will the CVE trend continue?

An effective cloud security posture begins with these three steps

Public cloud adoption continues to surge, with roughly 83% of all enterprise workloads expected to be in the cloud by the end of the year. The added flexibility and lower costs of cloud computing make it a no-brainer for most organizations. Yet while c… Continue reading An effective cloud security posture begins with these three steps

USB storage devices: Convenient security nightmares

There’s no denying the convenience of USB media. From hard drives and flash drives to a wide range of other devices, they offer a fast, simple way to transport, share and store data. However, from a business security perspective, their highly accessibl… Continue reading USB storage devices: Convenient security nightmares

Three major gaps in the Cyberspace Solarium Commission’s report that need to be addressed

Released in March 2020, the Cyberspace Solarium Commission’s report urges for the U.S. government and private sector to adopt a “new, strategic approach to cybersecurity,” namely layered cyber deterrence. Among the Commission’s lengthy 182-page report’… Continue reading Three major gaps in the Cyberspace Solarium Commission’s report that need to be addressed

How do I select an application security testing solution for my business?

Software-related issues continue to plague organizations of all sizes, so IT leaders are turning to application security testing tools for help. Since there are many types of programs available on the market, choosing one is not a straightforward proce… Continue reading How do I select an application security testing solution for my business?

Tech businesses must rethink their IT infrastructure

Working life has changed drastically in recent months. Speedy digital transformation has been critical for business continuity and has been driving growth even during these challenging times. The current climate has also put immense strain on the IT in… Continue reading Tech businesses must rethink their IT infrastructure

Better cybersecurity hinges on understanding actual risks and addressing the right problems

SANS Technology Institute’s Internet Storm Center (ISC) has been a valuable warning service and source of critical cyber threat information to internet users, organizations and security practitioners for nearly two decades. Dr. Johannes Ullrich, … Continue reading Better cybersecurity hinges on understanding actual risks and addressing the right problems

Business efficiency metrics are more important than detection metrics

With cyberattacks on the rise, today’s security professionals are relying primarily on detection metrics – both key performance indicators (KPIs) and key risk indicators (KRIs) – as the primary means to measure the success of their security programs. H… Continue reading Business efficiency metrics are more important than detection metrics