Strong Things Have Deep Roots: Capitalizing On Half a Century Of Positive Action In The Cybersecurity Sector  

Being a cybersecurity company in these turbulent times puts us at Tripwire, to some degree, on the front-line. Working with the largest organisations in government, finance and critical national infrastructure, we see good and bad every day. In a confu… Continue reading Strong Things Have Deep Roots: Capitalizing On Half a Century Of Positive Action In The Cybersecurity Sector  

Security Current Releases CISO-Authored Research Report on Third Party Risk Management

CISOs Investigate: Third Party Risk Management Is a Peer-driven Buyers Guide for Security Professionals Security Current announced today the release of its CISO-authored report, CISOs Investigate: Third Party Risk Management (TPRM). As part of the exclusive CISO-authored research series, this report offers security leaders real-world insights as they make business-driven technology decisions when they engage…

The post Security Current Releases CISO-Authored Research Report on Third Party Risk Management appeared first on SecurityCurrent.

Continue reading Security Current Releases CISO-Authored Research Report on Third Party Risk Management

6 Cloud Security Threats Healthcare Companies May Face – With Solutions

For healthcare organizations that handle a lot of patient data, including very sensitive information, cloud computing is a revolution to data storage. Cloud computing in healthcare lowers data storage costs (compared to the old paper-storage era), enab… Continue reading 6 Cloud Security Threats Healthcare Companies May Face – With Solutions

5 Risks You Need to Remember When Securing Your Containers

Containers are on the rise. As reported by GlobalNewswire, Allied Market Research estimated that the application market would grow from its 2016 value of $698 million to $8.20 by 2025. With a compound annual growth rate of 31.8% between 2018 and 2025, … Continue reading 5 Risks You Need to Remember When Securing Your Containers

Cosmic Lynx: The Highly-Professional Cybercrime Gang Scamming Businesses Out of Millions of Dollars

Things just got serious. Business Email Compromise is no longer solely the province of chancers and opportunistic Nigerian actors such as the Yahoo Boys. Organised criminal gangs with a high level of professionalism have seen the opportunity and seized… Continue reading Cosmic Lynx: The Highly-Professional Cybercrime Gang Scamming Businesses Out of Millions of Dollars

I Have Antivirus; I’m Protected, Right? Mis-steps Customers Make with their Security and Vulnerability Tools

I’ve worked in the IT field for over 30 years. 20 of those years have been spent in the network security field, employed by some of the largest names in the industry. But to my family, I’m still just the guy who “works with computers&… Continue reading I Have Antivirus; I’m Protected, Right? Mis-steps Customers Make with their Security and Vulnerability Tools

Ransomware Characteristics and Attack Chains – What you Need to Know about Recent Campaigns

Ransomware has been around for decades going back all the way to 1989. Since then it has only magnified in scope and complexity. Now at a time when working remotely is becoming more universal and the world is trying to overcome the Covid-19 pandemic, r… Continue reading Ransomware Characteristics and Attack Chains – What you Need to Know about Recent Campaigns

Using “Update.exe” as a Case Study for Robust OT Cybersecurity

In 2020, car manufacturer Honda fell victim to a ransomware attack. Using a payload called “update.exe,” the attack crippled Honda’s international customer service and Financial Services wing for days. Although it affected two custome… Continue reading Using “Update.exe” as a Case Study for Robust OT Cybersecurity

Entornos ICS y gestión de parches: qué hacer si no puede aplicar parches

La evolución de las de amenazas de ciberseguridad destaca la necesidad emergente de que las organizaciones fortalezcan su capacidad para identificar, analizar y evaluar estos riesgos antes de que evolucionen a incidentes de ciberseguridad. Aunque … Continue reading Entornos ICS y gestión de parches: qué hacer si no puede aplicar parches