The most important point in a cyberattack is the moment before it happens

Let’s get the scary thing out of the way: more than half of businesses have dealt with a serious security breach in the last two years. The chances of one happening are so high that organizations need to plan for a breach. The good news, though, is the… Continue reading The most important point in a cyberattack is the moment before it happens

How data manipulation could be used to trick fraud detection algorithms on e-commerce sites

As the marketing of almost every advanced cybersecurity product will tell you, artificial intelligence is already being used in many products and services that secure computing infrastructure. But you probably haven’t heard much about the need to secur… Continue reading How data manipulation could be used to trick fraud detection algorithms on e-commerce sites

F-Secure Elements streamlines how organizations provision cyber security services

F-Secure launched F-Secure Elements: a new cloud-based platform that streamlines how organizations provision cyber security services. Available from F-Secure’s service partners with fixed-term license subscriptions, or usage-based billing for greater f… Continue reading F-Secure Elements streamlines how organizations provision cyber security services

Attackers can teach you to defend your organization against phishing

People click on links and attachments and will, unfortunately, keep clicking even if they should know better. They’ll click for the chance of winning a holiday, or even something as cheap as a $2 cup of coffee. No amount of awareness training is going … Continue reading Attackers can teach you to defend your organization against phishing

Outgunned CISOs navigate complex obstacles to keep rising attacks from turning into breaches

CISOs face a rising ‘security debt’ to secure their organizations against an increasing volume of attacks by well-armed criminals. Yet, despite going up against a criminal industry that enjoys advantages when it comes to speed and shared weaponry, CISO… Continue reading Outgunned CISOs navigate complex obstacles to keep rising attacks from turning into breaches

Outgunned CISOs navigate complex obstacles to keep rising attacks from turning into breaches

CISOs face a rising ‘security debt’ to secure their organizations against an increasing volume of attacks by well-armed criminals. Yet, despite going up against a criminal industry that enjoys advantages when it comes to speed and shared weaponry, CISO… Continue reading Outgunned CISOs navigate complex obstacles to keep rising attacks from turning into breaches

How do I select an attack detection solution for my business?

Around the world, organizations are facing a tremendous increase in cyber risk. A recent research reveals that 31% of companies now experience a cyberattack at least once a day, a trend that’s expected to skyrocket as cybercriminals employ AI and autom… Continue reading How do I select an attack detection solution for my business?

Nearly 40% of new ransomware families use both data encryption and data theft in attacks

Data-stealing ransomware attacks, information harvesting malware, and supply chain attacks are among the critical threats to organizations, according to F-Secure. One of the most notable trends highlighted is the evolution of ransomware – attacks that … Continue reading Nearly 40% of new ransomware families use both data encryption and data theft in attacks

Emotional intelligence playing an increasingly important role for CISOs

The increasing importance of emotional intelligence and other skills required to work with different stakeholders are placing new demands on CISOs. However, it’s also creating opportunities for CISOs to become leaders of their organizations, according … Continue reading Emotional intelligence playing an increasingly important role for CISOs