The six most common threats against the device that knows you best

What is the most intimate relationship in your life—aside from your partner, your children or your parents? For many of us, it’s our mobile phone. It’s the last thing we see before sleep, and it’s usually the first thing in our hands each morning… Continue reading The six most common threats against the device that knows you best

Emotet stages a comeback via Trickbot and spam

Emotet is back – a number of researchers have confirmed. About Emotet Emotet is a modular banking trojan that also functions as a downloader of other trojans and malware/ransomware. In January 2021, law enforcement and judicial authorities worldw… Continue reading Emotet stages a comeback via Trickbot and spam

How much trust should we place in the security of biometric data?

An increasing number of people around the world are being displaced by factors such as climate change, natural disasters, and wars. The people attempting to cross international borders may be doing so under significant pressures, and with little time f… Continue reading How much trust should we place in the security of biometric data?

We cannot afford for healthcare security to be the “lowest-hanging fruit”

Healthcare organizations have never been more essential. Yet when it comes to cybersecurity, too many hospitals, medical groups and research centers lag far behind other critical industries. While it is easy to blame this security deficiency on a persi… Continue reading We cannot afford for healthcare security to be the “lowest-hanging fruit”

We cannot afford for healthcare security to be the “lowest-hanging fruit”

Healthcare organizations have never been more essential. Yet when it comes to cybersecurity, too many hospitals, medical groups and research centers lag far behind other critical industries. While it is easy to blame this security deficiency on a persi… Continue reading We cannot afford for healthcare security to be the “lowest-hanging fruit”

Phishing attempts: Employees can be the first line of defense

33% of emails employees report as phishing attempts are either malicious or highly suspect, according to new research. The finding comes from an analysis of emails reported by employees from organizations across the globe during the first half of 2021,… Continue reading Phishing attempts: Employees can be the first line of defense

How the pandemic delivered the future of corporate cybersecurity faster

William Gibson once wrote, “The future is already here – it’s just not very evenly distributed.” The rise of “distributed work”—people working from everywhere, at all hours of the day—has been a normal part of corporate culture for at least the l… Continue reading How the pandemic delivered the future of corporate cybersecurity faster

F-Secure’s incident response services help organizations contain and mitigate security incidents

While it’s important to engage incident response during a cyber security incident, F-Secure Consulting’s global incident response offerings put equal emphasis on readiness as a strategy for mitigating the risk of cyber attacks. In the last 12 months, F… Continue reading F-Secure’s incident response services help organizations contain and mitigate security incidents

Questions that help CISOs and boards have each other’s back

Boards of directors and executives seem increasingly interested in understanding their companies’ security posture. And why wouldn’t they be? The ransomware threat posed by organized crime groups is considerable, and its impact can be devastating and t… Continue reading Questions that help CISOs and boards have each other’s back

Secure AI is the foundation of trustworthy AI

AI-based recommendation systems are used in many online services we enjoy today, including search engines, online shopping sites, streaming services, and social media. However, their growing influence over what people see and do on the internet has rai… Continue reading Secure AI is the foundation of trustworthy AI