The factors driving today’s accelerated zero trust adoption

Zero trust has quickly progressed from a buzzword to a critical business imperative, Okta’s 2022 State of Zero Trust Security Report has found. Today, 97% of businesses say that they have a zero trust initiative in place or will have one in the next 12… Continue reading The factors driving today’s accelerated zero trust adoption

Credential phishing attacks skyrocketing, 265 brands impersonated in H1 2022

Abnormal Security released a which report explores the current email threat landscape and provides insight into the latest advanced email attack trends, including increases in business email compromise, the evolution of financial supply chain compromis… Continue reading Credential phishing attacks skyrocketing, 265 brands impersonated in H1 2022

Which malware delivery techniques are currently favored by attackers?

A wave of cybercriminals spreading malware families – including QakBot, IceID, Emotet, and RedLine Stealer – are shifting to shortcut (LNK) files for email malware delivery. Shortcuts are replacing Office macros – which are starting to be blocked by de… Continue reading Which malware delivery techniques are currently favored by attackers?

Solution to cybersecurity skills gap largely sits with hiring practices

(ISC)² published findings from its 2022 Cybersecurity Hiring Managers research that shed light on best practices for recruiting, hiring and onboarding entry- and junior-level cybersecurity practitioners. The research, reflecting the opinions of 1,250 c… Continue reading Solution to cybersecurity skills gap largely sits with hiring practices

Phishing reaches all-time high in early 2022

The APWG’s Phishing Activity Trends Report reveals that in the first quarter of 2022 there were 1,025,968 total phishing attacks—the worst quarter for phishing observed to date. This quarter was the first time the three-month total has exceeded o… Continue reading Phishing reaches all-time high in early 2022

Recovery and resilience: CISO insights into the 2022 cybersecurity landscape

I recently had the opportunity to meet and speak with several luminaries of the global security ecosystem: Roger Hale – Chief Security Officer; BigID, Sounil Yu – CISO and Head of Research at JupiterOne; Debbie Taylor Moore – VP and S… Continue reading Recovery and resilience: CISO insights into the 2022 cybersecurity landscape

How to support women in cybersecurity

Cybersecurity is required to be a dynamic industry because cybercriminals don’t take days off. Cybersecurity professionals must be innovative, creative, and attentive to keep gaining the upper hand on cybercriminals. Unfortunately, there are millions o… Continue reading How to support women in cybersecurity

DDoS threats growing in sophistication, size, and frequency

Corero Network Security has published the latest edition of its annual DDoS Threat Intelligence Report that compiles the trends, observations, predictions, and recommendations based on DDoS attacks against Corero customers during 2021. The report, now … Continue reading DDoS threats growing in sophistication, size, and frequency

$39.5 billion lost to phone scams in last year

Truecaller announced a research conducted in partnership with The Harris Poll in March of 2022, and the findings detail trends/insights on the impact of spam and phone scams that have increasingly permeated the U.S. over the last 12 months. The study e… Continue reading $39.5 billion lost to phone scams in last year