In this interview with Help Net Security, Fred Kneip, CEO at CyberGRX, talks about the lack of visibility into third-party risk, how to address this issue, and what companies should consider when choosing the right cloud provider. The pandemic has forc…Read More Third-party cloud providers: Expanding the attack surface
Here’s an overview of some of last week’s most interesting news, articles and interviews: Attackers are exploiting zero-day RCE flaw to target Windows users (CVE-2021-40444) Attackers are exploiting CVE-2021-40444, a zero-day remote code ex…Read More Week in review: How CISSP can change a career, rural hospitals cybersecurity, Patch Tuesday forecast
The growing number of ransomware attacks has burdened many oganizations, but it has also greatly impacted the cyber insurance industry, which found itself having to cover large ransomware demands. This called for a chenge in policies but also the need …Read More The impact of ransomware on cyber insurance driving the need for broader cybersecurity knowlege
In this interview with Help Net Security, Dr Shreekant Thakkar, Chief Researcher, Secure Systems Research Centre at TII, talks about the ever evolving threat landscape and how automation could improve the way organizations detect and respond to attacks…Read More The role of automation in staying on top of the evolving threat landscape
The pandemic has had a major impact on almost every aspect of our society and left many organizations susceptible to increasingly sophisticated ransomware attacks. In this interview with Help Net Security, David Taylor, managing director, Incident Resp…Read More Ransomware attacks: The power of adaptation
The adoption of container architectures is growing steadily, but security and compliance remain top concerns for enterprises, a recent survey revealed. To select a suitable container security solution for your business, you need to think about a variet…Read More How do I select a container security solution for my business?
Ever since it started, the pandemic has greatly affected the overall threat landscape, with different organizations falling victims to cyberattacks. Understandably, those who had been hit the most were the healthcare organizations. The change in their …Read More Healthcare cybersecurity under attack: How the pandemic affected rural hospitals
Here’s an overview of some of last week’s most interesting news, articles and interviews: Patched: Critical bug with public PoC exploit in Cisco infrastructure virtualization software (CVE-2021-34746) A critical vulnerability (CVE-2021-3474…Read More Week in review: The state of maritime cybersecurity, zero trust architecture challenges
Brough to you by cybersecurity researcher Kim Crawley and pentester and author Phillip L. Wylie, The Pentester Blueprint gives insights into the most common hurdles encountered by aspiring penetration testers, as well as tips on how to overcome them. T…Read More Review: The Pentester Blueprint: Starting a Career as an Ethical Hacker
Digital transformation has been around for a while, but last year it accelerated its pace significantly. As organizations suddenly shifted to an almost exclusively digital world, the need to protect digital assets grew even more. One way to tackle thes…Read More How do I select a managed cybersecurity solution for my business?
Data loss prevention (DLP) has become even more important in the last year. Since the pandemic has made companies shif to a remote workforce model, cybersecurity threats have become increasingly complex and data security even more fragile. Companies ne…Read More How do I select a DLP solution for my business?
A recent report predicts that home networks, remote working software and cloud systems will be at the center of a new wave of attacks in 2021. Cybercriminals in 2021 will particularly look to home networks as a critical launch pad to compromising corpo…Read More How do I select a network monitoring solution for my business?
Digital rights management (DRM) is a method to protect copyrights for digital media. In a world where technology allows us to share and copy various media and files, it is important to prevent or restrict unauthorized modification or distribution. This…Read More How do I select a DRM solution for my business?