The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

In a year full of company milestones, it’s not surprising that we have more great news to share. We were recently the only company named a Leader and Fast Mover in the GigaOm Radar Report for Data Loss Prevention. If you’re interested in checking out t… Continue reading The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

How DDoS Attacks Are Different for Service Providers

Protecting Service provider’s large-scale network is different, most service providers implement a DDoS protection after the fact.
The post How DDoS Attacks Are Different for Service Providers appeared first on Radware Blog.
The post How DDoS Attacks … Continue reading How DDoS Attacks Are Different for Service Providers

Why Are Ransomware Attacks Against OT Increasing?

Most discussions around cybersecurity understandably focus on information technology (IT). Assets like cloud services and data centers are typically what companies spend the most time and effort securing. Recently, though, operational technology (OT) h… Continue reading Why Are Ransomware Attacks Against OT Increasing?

MSSPs Particularly Vulnerable to Cisco FDM Flaw

Of all those who potentially face a threat from the recently disclosed vulnerability on the Cisco Firepower Device Manager (FDM), MSSPs could feel the impact the hardest if adversaries decide to exploit it. “An MSSP may be operating Cisco Firepower De… Continue reading MSSPs Particularly Vulnerable to Cisco FDM Flaw

COVID Anti-Vaxxers Make $$$ from Crowdfunding

People who spread anti-vaccine myths on the internet—why do they do it?
The post COVID Anti-Vaxxers Make $$$ from Crowdfunding appeared first on Security Boulevard.
Continue reading COVID Anti-Vaxxers Make $$$ from Crowdfunding

Five worthy reads: The never-ending love story between cyberattacks and healthcare

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the legacy between the healthcare industry and cyberattacks, the vulnerable points in the… Continue reading Five worthy reads: The never-ending love story between cyberattacks and healthcare

Make Cyberattacks Like Hafnium Irrelevant

Recent statements issued by the United States, European Union, and the United Kingdom have accused China of conducting the cyberattack against Microsoft’s Exchange Servers. China continues to deny the claims, but officials identified Hafnium, (a … Continue reading Make Cyberattacks Like Hafnium Irrelevant

SHOCKER: Senate Says Security Sucks—Still

A Senate committee graded cybersecurity as poor among eight big agency departments. Not much has changed since the last report.
The post SHOCKER: Senate Says Security Sucks—Still appeared first on Security Boulevard.
Continue reading SHOCKER: Senate Says Security Sucks—Still

Bitglass Security Spotlight: Ransomware Developments, Additional SolarWinds Victims, and More Data Breaches

Here are the top security stories from recent weeks: 

Kaseya Obtains Master Decryption Key for REvil Ransomware
DarkSide Ransomware Gang Rebrands as BlackMatter
DOJ Says Email Accounts of 27 U.S. Attorneys’ Offices Were Breached During SolarWinds Ha… Continue reading Bitglass Security Spotlight: Ransomware Developments, Additional SolarWinds Victims, and More Data Breaches

Threat Hunting Enables Early Detection and Response

From recent ransomware attacks on meatpacking giant JBS and oil transporter Colonial Pipeline to the massive SolarWinds breach that rattled both the public and private sectors, disruptive, costly and headline-making cyberattacks are happening at an al… Continue reading Threat Hunting Enables Early Detection and Response