3 major threat detection methods explained

The importance of threat detection cannot be overstated. A recent Verizon study revealed that the top discovery method (more than 50%) for breaches is in fact disclosure by the threat actor themselves after a successful compromise. As attacks continue … Continue reading 3 major threat detection methods explained

How companies can avoid costly data breaches

IBM found that it takes on average 277 days to discover a security breach and costs businesses an average of $4.35 million per breach. Moreover, the time-to-discovery can blindside companies, and with a recession looming, this is not the time for them … Continue reading How companies can avoid costly data breaches

Preventing a ransomware attack with intelligence: Strategies for CISOs

Bad news first: Ransomware isn’t going anywhere. The good news? The right intelligence can help organizations dramatically reduce risk surrounding a cyber extortion event. In fact, when organizations are armed with intelligence that’s timely, relevant,… Continue reading Preventing a ransomware attack with intelligence: Strategies for CISOs

Fear of cyberattacks drives SMBs to spend more on software

Despite fears of a looming recession, SMBs in the U.S. are spending more on software in 2023, according to Capterra’s 2023 SMB Software Buying Trends Survey. 75% of U.S. SMBs estimate they’ll spend more on software in 2023 compared to 2022. Alongside i… Continue reading Fear of cyberattacks drives SMBs to spend more on software

68% of IT leaders are worried about API sprawl

Axway announced new data from its inaugural 2022 Open Everything Strategy Survey Report, which found that nearly 40% of organizations are in the process of adopting a new hybrid approach for their IT infrastructure. The transformation comes as 68% of r… Continue reading 68% of IT leaders are worried about API sprawl

How cloud PCs act as an insurance plan for ransomware recovery

Although companies are spending billions on preventative security measures, attacks are a common occurrence. Business continuity requires enterprises to go beyond prevention and prioritize a strategic recovery plan. In this Help Net Security video, Mat… Continue reading How cloud PCs act as an insurance plan for ransomware recovery

5 free resources from the Cybersecurity and Infrastructure Security Agency (CISA)

The Cybersecurity and Infrastructure Security Agency (CISA) is an agency of the United States Department of Homeland Security. CISA is in charge of enhancing cybersecurity and infrastructure protection at all levels of government, coordinating cybersec… Continue reading 5 free resources from the Cybersecurity and Infrastructure Security Agency (CISA)

Cybersecurity implications of using public cloud platforms

According to a recent Node4 report, IT managers have a generally positive view of public cloud platforms. Half of the respondents said that, despite benefits, they have had to migrate a workload back off a public cloud platform — and called out several… Continue reading Cybersecurity implications of using public cloud platforms