The big news in critical infrastructure security is the ransomware-triggered shutdown of the Colonial gasoline pipeline – the largest such pipeline in the USA. The attack has been attributed to the DarkSide ransomware group. The group subsequentl…Read More What the pipeline attack means for critical infrastructures
Employee engagement (56%), burnout (53%), and reduced productivity (52%) are top concerns for IT leaders in 2021 and beyond, as they continue to enable remote workers and plan for new, hybrid workplace environments, according to Wrike. Last year’s shif…Read More Top concerns for IT leaders planning for hybrid workplace environments
Salesforce isn’t rocket science, but the software has an incredible array of tools, which is why securing it demands a unique (and sometimes complex) approach. If you’re hoping to mitigate risks associated with your company’s use of Salesforce, y…Read More Acting on a security risk assessment of your organization’s use of Salesforce
The public key infrastructure (PKI) underpins the most effective strategy for securing communications between machines, network and mobile devices, virtual servers, and the IoT, whether inside or outside the firewall. As the volume of machines, devices…Read More Dispelling four myths about automating PKI certificate lifecycle management
Pentesting, also known as penetration testing, is a security assessment, an analysis, and progression of simulated attacks on an application (web, mobile, or API) or network to check its security posture. The objective is to penetrate the application o…Read More How modern workflows can benefit from pentesting
As companies exit the pandemic, security leaders will be challenged with new data security complexities. Remote work over the past year magnified challenges that companies face around protecting data exposure and file exfiltration from insider risk, an…Read More Pandemic accelerating need for insider risk management
While there is awareness of password security best practices, there is still work to be done to put that awareness to full use, a Bitwarden survey reveals. While Americans are more likely to report being affected by a data breach in the last 18 months …Read More Users increasingly putting password security best practices into play
When it comes to digital transformation and its significance amongst other corporate priorities, 80% of CFOs globally cite it is within the top-five of their list of priorities. Furthermore, 71% of CFOs surveyed believe that digital transformation inve…Read More Digital transformation investments a top priority for most CFOs
Several years ago, risk-based cybersecurity was a largely untested and hotly debated topic. But the tests have since been administered and the debate largely settled: risk-based cybersecurity produces proven results. The data shows that risk-based vuln…Read More Risk-based vulnerability management has produced demonstrable results
Although 80% organizations recognize cloud computing as being vital to their financial security, 57% have encountered unexpected costs, according to a study from Aptum. 80% IT professionals see success in utilizing cloud services to unlock greater busi…Read More How organizations can optimize cloud spend
35% of UK IT decision makers admitted that their remote workers have already knowingly put corporate data at risk of a breach in the last year according to an annual survey conducted by Apricorn. This is concerning given that over one in ten surveyed I…Read More 58% of orgs predict remote workers will expose them to data breach risk
The insurance industry is vast and varied. It can be found in nearly every country in the world, with the earliest references dating back as early as 1750 BC. Modern insurance, however, started around 1686 with Lloyd’s of London and with the U.S. found…Read More APIs in the insurance industry: Accessing a growing world of data
Axonius released a report which reveals the extremes to which the pandemic escalated lack of visibility into IT assets and how that is impacting security priorities. According to the study conducted by ESG, organizations report widening visibility gaps…Read More Lack of visibility into IT assets impacting security priorities
There was a massive increase in cyber threats globally year-over-year fueled by both the pandemic and expanding attack surfaces, Skybox Security reveals. Expanding attack surfaces New malware samples nearly doubled: New ransomware samples increased 106…Read More Massive rise in threats across expanding attack surfaces
The debate within business organizations of whether to use consumer devices or to invest in rugged devices for the operations side of their business is as old as personal computing itself. And with the pandemic having shown that endpoint management is …Read More Why enterprises need rugged devices with integrated endpoint management systems
Out with the old, in with MACH. That’s what a poll of global IT leaders found regarding their plans to revamp, or retain, their enterprise architectures. The research, conducted by DJS Research, polled senior level technology decision makers (CIO…Read More C-level executives driving the adoption of MACH across their organizations
On Feb 5th, 2021, a hacker gained remote access to a water treatment plant in Oldsmar, Florida, and was able to adjust the amount of sodium hydroxide in the water from 100 parts per million to 11,100. Thanks to the physical fail-safes and alarm systems…Read More U.S. municipalities are the perfect target for cybercriminals in 2021
After earning his master’s degree in computer science and working on the IT side of the business at a number of large financial services organizations, Bobby Balanchdran observed one interesting thing: the legal department in these organizations had be…Read More Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
Many organizations have maintained heavy investment in cybersecurity over the last year, even in an unpredictable time when other spending has faltered. Gartner estimates that IT security and risk management spending still grew 2.6 percent even as IT s…Read More Physical cyber threats: What do criminals leave when they break in?
Databases are the lifeblood store of information for every organization. Without them, the organization’s efficiency, productivity and scope to prosper would be curtailed severely. Protecting the company crown jewels is something that most organization…Read More Database encryption: Protecting the crown jewels
A recent report predicts that home networks, remote working software and cloud systems will be at the center of a new wave of attacks in 2021. Cybercriminals in 2021 will particularly look to home networks as a critical launch pad to compromising corpo…Read More How do I select a network monitoring solution for my business?
Turbonomic announced findings from the survey of over 800 global IT professionals that examines the current state of multicloud adoption, its drivers, and the technologies enabling it, including containers, public cloud, and edge computing. The analysi…Read More The state of multicloud adoption, its drivers, and the technologies enabling it
Malwarebytes announced the findings of its report which explores how the global pandemic forced many employees to quickly become a remote workforce and confined consumers to their homes. In the wake of this change, cybercriminals ditched many of their …Read More Criminals leveraging shift to remote work to develop targeted attacks
More than 70% of CXOs of global companies consider mainframe or legacy modernization a strategic business priority for the next three years, a Tata Consultancy Services survey reveals. The study surveyed 211 CXOs and senior decision makers from compani…Read More CXOs consider mainframe and legacy modernization a business priority
The increasing importance of emotional intelligence and other skills required to work with different stakeholders are placing new demands on CISOs. However, it’s also creating opportunities for CISOs to become leaders of their organizations, according …Read More Emotional intelligence playing an increasingly important role for CISOs
What is CIEM? Among the many changes of 2020, Gartner added a new category: cloud infrastructure entitlement management (CIEM). While CIEM may sound similar to SIEM (security information and event management), the two security solutions are not the sam…Read More Why do enterprise SOC teams need CIEM now?
The most significant barrier to achieving DevSecOps is the continued perception that “Sec” is not already a part of “Dev” and “Ops”, says James Arlen, CISO at cloud data platform provider Aiven. Also, the fact this needs to be explicitly called out is …Read More Tips for boosting the “Sec” part of DevSecOps
Cybersecurity spending in critical infrastructure has been little impacted by the COVID-19 pandemic, save for some reshuffling on where that spend is most needed. The effect has been mostly in increased demand for secure remote connectivity. Most of th…Read More Cybersecurity spending for critical infrastructure to reach $105.99 billion in 2021
Recently, much of the cybersecurity commentary and blogs have talked about new approaches for protecting the network, especially beyond the perimeter. For the past few years, the industry has focused on conditional access (i.e., identity as the new per…Read More Have we put too much emphasis on protecting the network?
As the pandemic continues to challenge organizations worldwide, the role of chief financial officers (CFOs) has moved further beyond “economic guardians” of the enterprise to “architects of business value” and “catalysts of digital strategies,” with 72…Read More CFOs are becoming catalysts of digital strategy
2020 was chock full of surprises and twists that no analyst could have predicted and came with a massive shift to remote working and tools that facilitate it. The good news is that managed service providers (MSPs) saw tremendous growth both due to the …Read More 5 cybersecurity trends MSPs must address in 2021
During the past year, business leaders have seen first-hand the benefits of adopting an everywhere enterprise model of working and are now carefully considering its role in the future of work. A study by Mercer revealed 94% of employers agreed that pro…Read More Protecting productivity within the disappearing perimeter
This is the sort of story that starts as a comment on Twitter, then becomes a blog post when I realize I can’t fit all the ideas into one or two Tweets. (You know how much I hate Tweet threads, and how I encourage everyone to capture deep thoughts in b…Read More Seven Security Strategies, Summarized