Despite Pen Testing Efforts, Stubborn Vulnerabilities Persist

For those security professionals who work to mitigate enterprise software vulnerabilities, it may often seem like Groundhog Day—patching and mitigating the same types of vulnerabilities over and over again. As a just-released report from crowdsourced … Continue reading Despite Pen Testing Efforts, Stubborn Vulnerabilities Persist

Spoofed Domains Still a Persistent Threat

Domains impersonating companies and their brand names still pose a significant threat—research from Digital Shadows released today found that on average 1,100 fake websites are registered against individual organizations annually. And with commercial … Continue reading Spoofed Domains Still a Persistent Threat

How to Build a Cybersecurity Culture

Are you tired of seeing your papier-mâché network defenses torn to shreds? Do you wish you could fake your way through yet another audit, but fear being exposed by a data leak? Are hoodlums in Adidas clothing using your IT infrastructure as their own … Continue reading How to Build a Cybersecurity Culture

How Public Cybersecurity Companies Performed in 1H 2021

A good way to monitor the overall health of the IT security industry is to track the publicly traded companies in the space. I previously reported on the performance of 20 cybersecurity companies in 2020. This is an update on those 20 companies with t… Continue reading How Public Cybersecurity Companies Performed in 1H 2021

Propaganda as a Social Engineering Tool

Remember WYSIWYG? What you see is what you get. That was a simpler time in technology; you knew what the end result would be during the development stage. There were no surprises. Technology moved on, though. Now, the mantra should be, “don’t automati… Continue reading Propaganda as a Social Engineering Tool

Phishing, Ransomware Driving Wave of Data Breaches

Data compromises have increased every month this year except May. If that trend continues, or even if there is only an average of 141 new compromises per month for the next six months, the total will still exceed the previous high of 1,632 breaches se… Continue reading Phishing, Ransomware Driving Wave of Data Breaches

Top 5 Physical Security Considerations

With the rise of IoT technology across every aspect of business, security convergence is quickly becoming the new norm. In a world where just about everything is connected to the internet and to other devices, old strategies are becoming obsolete. Tre… Continue reading Top 5 Physical Security Considerations

How to Prepare for a Cyberattack

Preventing cyberattacks isn’t easy. If it were, there wouldn’t be a continuous stream of ransomware attacks dominating news feeds, nor would the president of the United States feel compelled to issue executive orders on cybersecurity or to declare tha… Continue reading How to Prepare for a Cyberattack

Cities Key in War on Ransomware, Neuberger Tells Mayors

When the cybersecurity industry talks about how critical public-private collaboration is to fending off and responding to threats, most of the “public” part of the conversation centers around the federal government, with individual states more recentl… Continue reading Cities Key in War on Ransomware, Neuberger Tells Mayors

Cryptomining Scam Apps, ‘Stealer’ Trojans Culled from Google Play

There’s a whole lot going on over at the Google Play store. First, Lookout researchers found 170 apps used in cryptomining scams that have snared more than 93,000 victims. Actually, only 25 were available for download on Google Play; the vast majority… Continue reading Cryptomining Scam Apps, ‘Stealer’ Trojans Culled from Google Play