Justifying your 2021 cybersecurity budget

Sitting in the midst of an unstable economy, a continued public health emergency, and facing an uptick in successful cyber attacks, CISOs find themselves needing to enhance their cybersecurity posture while remaining within increasingly scrutinized bud… Continue reading Justifying your 2021 cybersecurity budget

Surge in cyber attacks targeting open source software projects

There has been a massive 430% surge in next generation cyber attacks aimed at actively infiltrating open source software supply chains, Sonatype has found. Rise of next-gen software supply chain attacks According to the report, 929 next generation soft… Continue reading Surge in cyber attacks targeting open source software projects

Most enterprises hit cloud migration problems, still run apps on legacy operating systems

More than nine out of 10 of US enterprises in the Dow Jones, Fortune 250 and 500, and S&P 100 have run into cloud migration problems when it comes to moving legacy business applications to the cloud, with over three quarters holding applications b… Continue reading Most enterprises hit cloud migration problems, still run apps on legacy operating systems

Enterprises adopt edge workloads, yet still use unsuitable legacy storage solutions

By 2025 organizations will churn out 175 zetta-bytes of data, IDC predicts. However bottlenecks and compute problems continue to plague IT pros as they struggle to support their growing edge workloads, acording to a survey of more than 300 storage prof… Continue reading Enterprises adopt edge workloads, yet still use unsuitable legacy storage solutions

Flaw in Iomega, LenovoEMC NAS devices exposes millions of files on the Internet

A vulnerability in legacy Iomega and LenovoEMC network-attached storage (NAS) devices has led to many terabytes of potentially sensitive data being accessible to anyone via the Internet. About Iomega and LenovoEMC Iomega Corporation was acquired in 200… Continue reading Flaw in Iomega, LenovoEMC NAS devices exposes millions of files on the Internet

Most SMB devices run Windows versions that are expired or will expire by January 2020

There is a steady increase in attacks and changes in attack methods that target weaknesses in encryption, workload configuration, limited visibility into vulnerabilities and outdated and unsupported operating systems, according to a research by Alert L… Continue reading Most SMB devices run Windows versions that are expired or will expire by January 2020

What is and what is not working for security operations teams in securing cloud data

Security professionals continue to face a number of major challenges as more organizations move legacy IT operations to cloud infrastructure and applications, and traditional security tools often fall short, according to Delta Risk. The research, produ… Continue reading What is and what is not working for security operations teams in securing cloud data

How to diminish the great threat of legacy apps

The Equifax breach underscored the risk posed by unpatched software applications. As a refresher, 146 million customer records were exposed after a known vulnerability in Apache Struts was exploited. The reality is enterprises are supporting an ever-gr… Continue reading How to diminish the great threat of legacy apps

Analysis of device data shines a light on cybersecurity risks in healthcare

The convergence of IT, IoT and OT makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks. IoT and OT devices are rapidly increasing in numbers, but traditional IT still represents the most v… Continue reading Analysis of device data shines a light on cybersecurity risks in healthcare

Legacy infrastructures and unmanaged devices top security risks in the healthcare industry

The proliferation of healthcare IoT devices, along with unpartitioned networks, insufficient access controls and the reliance on legacy systems, has exposed a vulnerable attack surface that can be exploited by cybercriminals determined to steal persona… Continue reading Legacy infrastructures and unmanaged devices top security risks in the healthcare industry