Third-party breaches hit 90% of top global energy companies

A new report from SecurityScorecard reveals a startling trend among the world’s top energy companies, with 90% suffering from data breaches through third parties over the last year. This statistic is particularly concerning given the crucial function these companies serve in everyday life. Their increased dependence on digital systems facilitates the increase in attacks on […]

The post Third-party breaches hit 90% of top global energy companies appeared first on Security Intelligence.

Continue reading Third-party breaches hit 90% of top global energy companies

Increasingly Sophisticated Cyberattacks Target Healthcare

It’s rare to see 100% agreement on a survey. But Porter Research found consensus from business leaders across the provider, payer and pharmaceutical/life sciences industries. Every single person agreed that “growing hacker sophistication” is the primary driver behind the increase in ransomware attacks. In response to the findings, the American Hospital Association told Porter Research, […]

The post Increasingly Sophisticated Cyberattacks Target Healthcare appeared first on Security Intelligence.

Continue reading Increasingly Sophisticated Cyberattacks Target Healthcare

What Comes After the Digital Transformation?

When Covid hit, companies had to accelerate their digital transformation process out of necessity. But now, almost three years after the initial shutdown, most organizations have embraced digital to the point where they are now maintaining new technologies rather than implementing more.  Cybersecurity is a crucial component of a company’s digital transformation. But have organizations […]

The post What Comes After the Digital Transformation? appeared first on Security Intelligence.

Continue reading What Comes After the Digital Transformation?

Securing Your Supply Chain Through Cyber Risk Management

Supply chain risk is now recognized as a top challenge, with more than half of security breaches attributed to supply chain and third-party suppliers. This can be a costly vulnerability. The global average data breach cost was $4.35 million last year, according to IBM’s Cost of a Data Breach 2022 report. These risks stem from […]

The post Securing Your Supply Chain Through Cyber Risk Management appeared first on Security Intelligence.

Continue reading Securing Your Supply Chain Through Cyber Risk Management

Will spyware maker NSO Group’s struggles reduce use of its eavesdropping tech? Critics doubt it.

The company announced layoffs and a reorganization on Sunday, but spyware researchers doubt that will reduce the use of its technology.

The post Will spyware maker NSO Group’s struggles reduce use of its eavesdropping tech? Critics doubt it. appeared first on CyberScoop.

Continue reading Will spyware maker NSO Group’s struggles reduce use of its eavesdropping tech? Critics doubt it.

“Trusted Partner” in Cybersecurity: Cliché or Necessity?

I dislike cliches. I suspect I’m not alone in that, but the truth is I’m guilty of using them on occasion — and I’m probably not alone in that, either. I was reading a tongue-in-cheek article the other day about the worst clichés in the business world. As you might imagine, some of the usual […]

The post “Trusted Partner” in Cybersecurity: Cliché or Necessity? appeared first on Security Intelligence.

Continue reading “Trusted Partner” in Cybersecurity: Cliché or Necessity?

5 Global Supply Chain Security Threats (and How to Handle Them)

In December 2020, a nation-state attack on the SolarWinds network management system compromised the supply chains of over 18,000 organizations, including the Pentagon and the Department of Homeland Security. With costs likely to run into the billions, this breach was one of the biggest incidents in recent years — but it won’t be the last. […]

The post 5 Global Supply Chain Security Threats (and How to Handle Them) appeared first on Security Intelligence.

Continue reading 5 Global Supply Chain Security Threats (and How to Handle Them)

Adopting Microsegmentation Into Your Zero Trust Model, Part 2

This is the second part in a series on zero trust and microsegmentation. Be sure to check out Part 1 here. Organizations are increasingly using a zero trust approach combined with microsegmentation to carefully balance the needs of security and access. Companies work with most vendors on a purely transactional basis — those vendors simply […]

The post Adopting Microsegmentation Into Your Zero Trust Model, Part 2 appeared first on Security Intelligence.

Continue reading Adopting Microsegmentation Into Your Zero Trust Model, Part 2

Wake Me Up Before You Know Know … About the Latest Third-Party Data Breach

“It has gotten to the point, unfortunately, where they are so frequent and common these days, that it’s like, here we go again,” Christopher Sitter says when I asked him about the prospect of a third-party data breach. Sitter is the senior director of information security at Juniper Networks. He manages all things incident response-related — […]

The post Wake Me Up Before You Know Know … About the Latest Third-Party Data Breach appeared first on Security Intelligence.

Continue reading Wake Me Up Before You Know Know … About the Latest Third-Party Data Breach

Vendor Management: 7 Tips for Security During Remote Work

Third-party vendor management can be a risk to an organization’s data and network security. Enterprises depend on vendors to use security best practices that meet company standards while using their services when they have access to the company network. But that was when most people were working from their company’s physical place of business and […]

The post Vendor Management: 7 Tips for Security During Remote Work appeared first on Security Intelligence.

Continue reading Vendor Management: 7 Tips for Security During Remote Work