Data Laundering Poses Privacy, Security Risks

Data laundering, like money laundering, is the act of acquiring data through an illegal means—whether that’s the dark web or a hacked/stolen database—and then taking that data and running it through a legitimate business or process in order to make th… Continue reading Data Laundering Poses Privacy, Security Risks

U.S., UK and Australia Issue Joint Cybersecurity Advisory

As vulnerabilities are discovered, advisories are issued, remedies and mitigations are shared and then the onus is on the end user and/or company to do what’s necessary to close the window into their infrastructure. That is what happens in a per… Continue reading U.S., UK and Australia Issue Joint Cybersecurity Advisory

Cyberresilience: Your Data Insurance Policy

In the wake of the Colonial Pipeline hack, businesses all over the world are getting a very loud reminder that they could be next to be compromised by a ransomware intrusion. For many, it’s not an ‘if,’ but a case of how and when. Even mul… Continue reading Cyberresilience: Your Data Insurance Policy

Why RaaS Has Become Easier to Launch

Straight from the researchers at Intel 471 comes this pro tip for cybersecurity teams inside organizations: Being proactive about what the cybercriminal underground is learning and how it’s behaving can help you pinpoint solutions for your secur… Continue reading Why RaaS Has Become Easier to Launch

The Perils of Cyber Insurance

On this episode of The View With Vizard, host Mike Vizard talks with Max Pruger, general manager of compliance for Kaseya, about the pros and cons, benefits and pitfalls of cyber insurance. The video is below, followed by a transcript of the conversat… Continue reading The Perils of Cyber Insurance

Elevating Web App Security to a National Priority

It’s been an eventful few months in terms of sizable cyberattacks. First, we had the SolarWinds hack, then the Colonial Pipeline ransomware attack made cybersecurity acutely real for millions of people in the U.S. Most recently, the Kaseya ransomware … Continue reading Elevating Web App Security to a National Priority

Pushing the Limits of IDaaS with AMaaS

Concern over secure access to data has led to significant adoption of cloud identity management solutions, specifically identity-as-a-service (IDaaS), to ensure that people accessing applications are who they say they are–that is, to authenticate thei… Continue reading Pushing the Limits of IDaaS with AMaaS

As Time to Fix Flaws Ticks Up, Mitigation Efforts Fall Short

Each month in 2021, NTT Application Security has been tracking the state of application security and the threat landscape, paying particular attention to the window of exposure (WoE), vulnerability by class and time to fix. Now, six months of data fro… Continue reading As Time to Fix Flaws Ticks Up, Mitigation Efforts Fall Short

Ransomware can penetrate quickly, significantly damaging an organization

Cloudian issued its 2021 Ransomware Victims Report, based on an independent survey of 200 IT decision makers whose organizations experienced a ransomware attack between 2019 and 2021. The survey found that traditional ransomware defenses are failing, w… Continue reading Ransomware can penetrate quickly, significantly damaging an organization

Mimecast Makes Security Training a Laughing Matter

Mimecast has found the best way to train employees on cybersecurity is with a healthy dose of humor. The company has developed a sitcom-style training program it offers via a subscription that’s making a big difference. Jann Yogman, senior direc… Continue reading Mimecast Makes Security Training a Laughing Matter