API security: Understanding the next top attack vector

Application Programming Interfaces (APIs) underpin today’s digital ecosystem as the essential connective tissue that allows companies to exchange data and information quickly and securely. As the post-pandemic world leans heavily on digital interaction… Continue reading API security: Understanding the next top attack vector

Ransomware and terrorism: For security pros the threat is equal

Venafi announced the findings of a global survey of more than 1,500 IT security decision makers that reveals that 60% of security professionals believe ransomware threats should be prioritized at the same level as terrorism. These opinions echo the U.S… Continue reading Ransomware and terrorism: For security pros the threat is equal

Control failures are behind a growing number of cybersecurity incidents

Data from a survey of 1,200 enterprise security leaders reveals that an increase in tools and manual reporting combined with control failures are contributing to the success of threats such as ransomware, which costs organizations an average of $1.85 m… Continue reading Control failures are behind a growing number of cybersecurity incidents

80% of organizations experienced employees misusing and abusing access to business apps

Organizations continue to operate with limited visibility into user activity and sessions associated with web applications, despite the ever-present risk of insider threats and credential theft, a CyberArk research reveals. While the adoption of web ap… Continue reading 80% of organizations experienced employees misusing and abusing access to business apps

The first step to being cybersmart: Just start somewhere

When it comes to a subject as complex as cybersecurity, it’s easy to become a victim of decision paralysis. When company leaders and IT staff begin looking at their options around improving their security and discover hundreds of possible solutions, th… Continue reading The first step to being cybersmart: Just start somewhere

Five proven techniques for building effective fraud management

Effective management of fraud has long been a vital capability within organizations, and for good reasons. According to the Association of Certified Fraud Examiners’ 2020 global study on occupational fraud and abuse, companies lose an estimated f… Continue reading Five proven techniques for building effective fraud management

Combating vulnerability fatigue with automated security validation

Security operations teams have been dealing with “alert fatigue” for far too long. The introduction of log monitoring (e.g., SIEM), firewall, and AV technologies over two decades ago provided valuable tools for IT teams to be alerted to known suspiciou… Continue reading Combating vulnerability fatigue with automated security validation

Cybereason Offers Comprehensive Visibility and Protection for Diverse Systems

As enterprise technical infrastructures become more complex, managing them grows increasingly difficult. Protection against the growing problem of cybercrime also remains a key aspect for anyone involved in IT management. Cybersecurity considerat… Continue reading Cybereason Offers Comprehensive Visibility and Protection for Diverse Systems

CISO Stories Podcast: Developing Secure Agile Code Quickly is Very Achievable

Speed to market is the mantra of software development today. This does not mean that a process is not followed, it means that an iterative approach to software development produces code changes and usable code much faster.
The post CISO Stories P… Continue reading CISO Stories Podcast: Developing Secure Agile Code Quickly is Very Achievable

What’s New in v8 of the CIS Controls

Back in 2018, the State of Security spent a lot of time going over v7 of the Center for Internet Security’s Critical Security Controls (CIS Controls). We noted at the time how the Center for Internet Security shuffled the order of requirements for many… Continue reading What’s New in v8 of the CIS Controls