Author Archives: The Cyber Security Place

Handling a crisis when you aren’t under attack

With global attacks dominating headlines cybersecurity is top priority, meaning the role of the CISO is expanding.CISOs need to expand their leadership role and actively engage in risk management.Traditionally, the

The post Handling a crisis when you aren’t under attack appeared first on The Cyber Security Place.

Security! The Top 5 Mobile Device Threats; Cryptomining Surges

Some obvious and not-so-obvious steps to take to stay secure on mobile devices.Security threats to mobile devices, which are an integral part of member lives and credit unions through digital

The post Security! The Top 5 Mobile Device Threats; Cryptomining Surges appeared first on The Cyber Security Place.

2018 Faces New Threats, But Same old Problems

Every year brings with it a new set of cyber-threats but unfortunately, the cyber-threats of 2017, 2016 and beyond are still with us.Phishing for authentication credentials, social engineering to install

The post 2018 Faces New Threats, But Same old Problems appeared first on The Cyber Security Place.

Two incident response phases most organizations get wrong

It’s important to remember: Incident response isn’t a thing, it’s a process.There is a baseline for incident response — six phases familiar to anyone who has spent time around a

The post Two incident response phases most organizations get wrong appeared first on The Cyber Security Place.

5 things you can expect to happen after the GDPR deadline

After several years in the making and around 24 months since it was officially ratified, the EU General Data Protection Regulation (GDPR) is almost here. The most important thing to

The post 5 things you can expect to happen after the GDPR deadline appeared first on The Cyber Security Place.

Redefining Cybersecurity Coverage to Reflect Next Generation Digital Transformation

The way analysts looked at the cybersecurity market five years ago is not the way they should be looking at it in 2018 and beyond. That’s the message from IDC’s

The post Redefining Cybersecurity Coverage to Reflect Next Generation Digital Transformation appeared first on The Cyber Security Place.

Securing Your Organization’s Human Layer

In my time in the trenches, and in my previous role as a Gartner research analyst and industry advisor, I spent a LOT of time helping organizations across the world

The post Securing Your Organization’s Human Layer appeared first on The Cyber Security Place.

Cryptomining, not ransomware, the top malware threat so far this year

Cryptominer-based attacks increased, while ransomware-based attacks decreased in Q1 2018, according to Comodo Cybersecurity Threat Research Labs.Cryptominer-based attacks, not ransomware-based attacks, have been the top threat so far this year,

The post Cryptomining, not ransomware, the top malware threat so far this year appeared first on The Cyber Security Place.

Botnets present 195,000 security threats every day

More than 100 million unique targets are being hit on a daily basis.Botnets, networks of infected machines that are used by cybercriminals everywhere to do their sinister bidding, are still

The post Botnets present 195,000 security threats every day appeared first on The Cyber Security Place.

Majority of focused cyber-attacks are being stopped

Companies are getting better at spotting things like ransomware and DDoS.Companies are nowadays faced with more than double the amount of ‘focused attacks’, compared to last year. However, they are

The post Majority of focused cyber-attacks are being stopped appeared first on The Cyber Security Place.

Password Managers: Business Gains vs Potential Pains

The growth in cybersecurity continues unabated and we see companies investing more and more in the area. According to Gartner, enterprise cybersecurity spending will rise to $96.3bn in 2018. Much

The post Password Managers: Business Gains vs Potential Pains appeared first on The Cyber Security Place.

Cryptominers Replace Ransomware as No. 1 Threat

Cryptominers surged to the top of detected malware incidents, displacing ransomware as the No. 1 threat.Comodo Cybersecurity Threat Research Labs’ first-quarter global malware report shows that the world is already

The post Cryptominers Replace Ransomware as No. 1 Threat appeared first on The Cyber Security Place.

Ransomware, healthcare and incident response: Lessons from the Allscripts attack

The actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned. On

The post Ransomware, healthcare and incident response: Lessons from the Allscripts attack appeared first on The Cyber Security Place.

Most Web Apps Contain High-Severity Vulnerabilities

An analysis of web applications shows that 94% of applications tested had at least one high-severity vulnerability.According to Positive Technologies’ Web Application Vulnerabilities in 2017 report, collated through the security

The post Most Web Apps Contain High-Severity Vulnerabilities appeared first on The Cyber Security Place.

How to Safeguard Your Business Against Cyber Crime

Cyber crime is one of the biggest threats facing UK businesses today, costing around £30 billion a year. As a result, it’s something businesses need to start taking seriously !The

The post How to Safeguard Your Business Against Cyber Crime appeared first on The Cyber Security Place.

Large scale data breaches provide drive for DevSecOps investments

Breaches related to open source components have grown 50 percent since 2017, and an eye-opening 121 percent since 2014, according to a new survey from open source governance and DevSecOps

The post Large scale data breaches provide drive for DevSecOps investments appeared first on The Cyber Security Place.

Common IT Tools are the Hacker’s Favorites

Malware, along with targeted attacks that can move laterally and evade traditional detection methods, are a huge and growing concern. Popular hacker tools like Mimikatz are being combined with stolen NSA

The post Common IT Tools are the Hacker’s Favorites appeared first on The Cyber Security Place.

Why organizations need business-centric data protection

A data protection team can help your enterprise take the best steps towards reducing the business risks and data breaches.Despite the recent surge in interest towards information security, we consistently

The post Why organizations need business-centric data protection appeared first on The Cyber Security Place.

What is cyber security? How to build a cyber security strategy

Organizations face many threats to their information systems and data. Understanding all the basic elements to cyber security is the first step to meeting those threats.Cyber security is the practice

The post What is cyber security? How to build a cyber security strategy appeared first on The Cyber Security Place.

How to Comply with GDPR

In a little over a month – on May 25, to be precise – the EU’s General Data Protection Regulation (GDPR) will take effect, and if your company is not

The post How to Comply with GDPR appeared first on The Cyber Security Place.

The continuous fluctuation of Bitcoin comes with the threat of cyber attacks

The cryptocurrency hype seems to have died down for now. But when it inevitably resurges, will there be security implications?Bitcoin is the flavour of the month at the moment, but

The post The continuous fluctuation of Bitcoin comes with the threat of cyber attacks appeared first on The Cyber Security Place.

Beyond malware: why breach detection is the new normal

As attack methods have grown increasingly complex, breach detection has become a must for organisations.Malware and the understanding of malware variants, families, and strains have been at the heart of

The post Beyond malware: why breach detection is the new normal appeared first on The Cyber Security Place.

Cyber-security only a top priority for one in ten businesses

Lack of attention despite numbers showing a strong increase in the amount of cyber-attacks.Just ten per cent of UK’s businesses see cyber-security as the biggest challenge to their economic success.

The post Cyber-security only a top priority for one in ten businesses appeared first on The Cyber Security Place.

Why it’s time to get serious to crypto-jacking: the ‘new age’ cyber threat

What’s becoming painstakingly apparent amidst these developments is the great lengths hackers will go to in order to take advantage of the systems of both public and private companies. Crypto-jacking

The post Why it’s time to get serious to crypto-jacking: the ‘new age’ cyber threat appeared first on The Cyber Security Place.

Ransomware incidents double, threatening companies of all sizes

Ransomware is the most common malware used when it comes to breaches, according to Verizon’s 2018 Data Breach Investigations Report. Verizon’s 2018 Data Breach Investigations Report (DBIR) is out, and

The post Ransomware incidents double, threatening companies of all sizes appeared first on The Cyber Security Place.

Securing your network in the IoT revolution

Instituting a comprehensive device management plan is essential to locking down Shadow IT at your organisation. The relationship between network security and the Internet of Things (IoT) has never been

The post Securing your network in the IoT revolution appeared first on The Cyber Security Place.

17% of Workers Fall for Social Engineering Attacks

In tests that imitated the actions of hackers by sending emails to employees with links to websites, password entry forms and attachments, 17% of the messages would have led to

The post 17% of Workers Fall for Social Engineering Attacks appeared first on The Cyber Security Place.

Information security can enable business as soon as we change the conversation

Information security is an enabler for business. This has been a mantra for some time, and although it is repeated at major conferences, the reality is that the lack of

The post Information security can enable business as soon as we change the conversation appeared first on The Cyber Security Place.

How the human factor puts your company at risk

Positive Technologies has released a new report with statistics on the success rates of social engineering attacks, based on the 10 largest and most illustrative pentesting projects performed for clients

The post How the human factor puts your company at risk appeared first on The Cyber Security Place.

Cybersecurity: How Do You Build a Transformational Dynamic?

At the end of a keynote speech I gave at the excellent CIO WaterCooler LIVE! Event in London on 28th September 2017 on security organization, governance and creating the dynamics

The post Cybersecurity: How Do You Build a Transformational Dynamic? appeared first on The Cyber Security Place.

One-Fifth of Open-Source Serverless Apps Have Critical Vulnerabilities

More than 20% of open-source serverless applications contain critical security vulnerabilities, according to an audit by PureSec. An evaluation of 1,000 open-source serverless projects revealed that 21% of them contained

The post One-Fifth of Open-Source Serverless Apps Have Critical Vulnerabilities appeared first on The Cyber Security Place.

Avoid These Security Mistakes During Cloud Migration

The headlong rush to the cloud continues to accelerate, promising increased efficiency, flexibility and security, but CSOs are not off the hook when it comes to fortifying the privacy and

The post Avoid These Security Mistakes During Cloud Migration appeared first on The Cyber Security Place.

Biometrics in the workplace: what about consent and legitimate interest?

How can organizations processing biometric data for workplace security or fraud prevention use cases ensure that they are compliant with requirements within the General Data Protection Regulation (GDPR)? This article

The post Biometrics in the workplace: what about consent and legitimate interest? appeared first on The Cyber Security Place.

Is blockchain technology really the future of the Internet?

Blockchain technology has the potential to revolutionize how business transactions take place.For those who have no idea who Satoshi Nakamoto is, it is the name used by the unknown person

The post Is blockchain technology really the future of the Internet? appeared first on The Cyber Security Place.

83% Of Enterprises Are Complacent About Mobile Security

These and many other insights are from the recently published Verizon Mobile Security Index 2018 Report. The report is available here for download (22 pp., PDF, no opt-in). Verizon commissioned

The post 83% Of Enterprises Are Complacent About Mobile Security appeared first on The Cyber Security Place.

Encryption an increasingly popular solution among organisations

Saves against human error, data theft or compliance issues.Organisations are turning towards encryption to keep their data safe, new reports from Thales are saying. The critical information systems company issued

The post Encryption an increasingly popular solution among organisations appeared first on The Cyber Security Place.

100% of Web Apps Contain Vulnerabilities

A totality – a full 100% – of web applications are vulnerable to hackers.According to Trustwave’s 2018 Global Security Report, derived from the analysis of billions of logged security and

The post 100% of Web Apps Contain Vulnerabilities appeared first on The Cyber Security Place.

What should define an enterprise encryption strategy?

The impact of the cyber security landscape is changing, with ‘protecting against specific identified threats’ knocking compliance off the top spot as the number one reason for deploying encryption. Securing

The post What should define an enterprise encryption strategy? appeared first on The Cyber Security Place.

Half of Cyber-Pros Believe They’re Losing the Fight

Half of cyber-pros believe they’re losing the war against the bad guys: 46% of those surveyed by security giant McAfee believe that in the next year they will either struggle

The post Half of Cyber-Pros Believe They’re Losing the Fight appeared first on The Cyber Security Place.

How to Cure the Healthcare System’s ‘Cyberflu’

Expensive, top-heavy, bureaucratic – the healthcare system is all that, but we’re all grateful to be living in an era when medicine has advanced to the point that it keeps

The post How to Cure the Healthcare System’s ‘Cyberflu’ appeared first on The Cyber Security Place.

What is Mitre’s ATT&CK framework? What red teams need to know

The ATT&CK framework allows security researchers and red teams to better understand hacker threats.The ATT&CK framework, developed by Mitre Corp., has been around for five years and is a living,

The post What is Mitre’s ATT&CK framework? What red teams need to know appeared first on The Cyber Security Place.

The best cybersecurity analysts should play the part of detective

Today’s cybersecurity analysts need to be part detective, following their gut wherever it takes them and thinking like the very attackers.With an ever-growing threat from cyber attacks, we now live

The post The best cybersecurity analysts should play the part of detective appeared first on The Cyber Security Place.

Why Multi-cloud Security Requires Rethinking Network

The Need to Rethink Security For Our Cloud Applications Has Become Urgent. Companies are utilizing the public cloud as their primary route to market for creating and delivering innovative applications.

The post Why Multi-cloud Security Requires Rethinking Network appeared first on The Cyber Security Place.

Unaware and Under Attack: Why Cybercrime Must be Top of Mind for Business

I am not really aware of any business in 2018 that doesn’t leverage the internet for their operations. From websites, email, paying bills online or receiving electronic payments, these are

The post Unaware and Under Attack: Why Cybercrime Must be Top of Mind for Business appeared first on The Cyber Security Place.

Using biometrics to protect crypto currency

The rise of crypto currency is something that investors have monitored closely. Whether Bitcoin, Zcash or Ripple, the rise of this digital currency is here to stay. With this boom

The post Using biometrics to protect crypto currency appeared first on The Cyber Security Place.

Open source software security challenges persist

Using open source components saves developers time and companies money. In other words, it’s here to stay. Here’s a look at what it will take to improve open source security.

The post Open source software security challenges persist appeared first on The Cyber Security Place.

Reducing the impact of AI-powered bot attacks

Fraudsters are harnessing AI to behave like humans, trick users and scale-up attacks.Bot attacks are drawing more and more headlines with tales of identity theft. The wealth of consumer data

The post Reducing the impact of AI-powered bot attacks appeared first on The Cyber Security Place.

Why IT Compliance Is Critical for Cyber Security

IT compliance is sort of like the forgotten stepchild of cyber security. It doesn’t get as much attention as data breach prevention technologies and policies, even though it is equally

The post Why IT Compliance Is Critical for Cyber Security appeared first on The Cyber Security Place.

Does Ransomware-as-a-Service Enable More Cyber-Criminals?

Ransomware is continuing to dominate the headlines, with attacks like WannaCry and NotPetya causing chaos. In fact, last year, over 50% of organizations where hit by ransomware, and on average

The post Does Ransomware-as-a-Service Enable More Cyber-Criminals? appeared first on The Cyber Security Place.

Why People Should Learn About Cybersecurity In 2018

You might think of cybersecurity as a specialized, niche career–not a skill that the average person should learn about.But that’s not the case. In an age where we manage more

The post Why People Should Learn About Cybersecurity In 2018 appeared first on The Cyber Security Place.

Steps to Take to Beat the Insider Threat in 2018

Hackers get the headlines, but a data breach is more likely to originate inside your own office walls. Errors, negligence and malicious intent by employees are the leading causes of

The post Steps to Take to Beat the Insider Threat in 2018 appeared first on The Cyber Security Place.

Is It Time to Unify Endpoint Management and Security?

Modern management makes sense and the industry is reacting. Will enterprise organizations jump on the bandwagon?Yesterday, VMware announced its intention to acquire E8 Security and integrate the technology into its

The post Is It Time to Unify Endpoint Management and Security? appeared first on The Cyber Security Place.

‘Tapping’ the network for enhanced security

With digital transformation driving greater access services, productivity growth and enhanced public services, there is added pressure to protect against potential security breaches and optimize network uptime. What can governments

The post ‘Tapping’ the network for enhanced security appeared first on The Cyber Security Place.

Blockchain securing the path towards a modern identity

Blockchain technology is a solution, which will help secure digital identities, as it cannot be erased or adapted without leaving a record, making it very difficult to hack. Digitising identities

The post Blockchain securing the path towards a modern identity appeared first on The Cyber Security Place.

Keep your mobile workforce safe: understand the threats

As you review your mobile security strategy, make sure the solutions you choose shield devices from infected apps, man-in-the-middle attacks, OS exploits, malicious links in SMS messages and other exploits.

The post Keep your mobile workforce safe: understand the threats appeared first on The Cyber Security Place.

Preventing the Next Ransomware Attack

2018 is quickly moving by us, and while we have yet to see an attack on the scale of 2017’s WannaCry or NotPetya, it’s clear that the adversaries are not

The post Preventing the Next Ransomware Attack appeared first on The Cyber Security Place.

New ways in endpoint protection: What should CIOs pay attention to?

With large-scale cyber attacks and dangerous vulnerabilities such as WannaCry and Spectre, companies have reached a point where the use of traditional antivirus (AV) technologies are no longer sufficient to

The post New ways in endpoint protection: What should CIOs pay attention to? appeared first on The Cyber Security Place.

Drop Everything and Enable Two-Factor Authentication Immediately

If you haven’t done so already after seeing the title of this article, please stop reading immediately and enable two-factor authentication (2FA) on every system and service you use that

The post Drop Everything and Enable Two-Factor Authentication Immediately appeared first on The Cyber Security Place.

Cryptocurrency Hacking Raises Threats of Financial Vulnerability

After suffering through rampant ransomware attacks, the internet is now being overrun by a new category of threats caused by cryptocurrency miners. As cryptocurrencies take hold and their prices fluctuate,

The post Cryptocurrency Hacking Raises Threats of Financial Vulnerability appeared first on The Cyber Security Place.

Five Ways Machine Learning Can Save Your Company From A Security Breach Meltdown

Just 55% of CEOs say their organizations have experienced a breach, while 79% of CTOs acknowledge breaches have occurred. One in approximately four CEOs (24%) aren’t aware if their companies

The post Five Ways Machine Learning Can Save Your Company From A Security Breach Meltdown appeared first on The Cyber Security Place.

Cryptojacking takes over from ransomware as cybercriminal’s choice

Symantec report finds cryptocurrency-related hacks gaining popularity at the expense of ransomware.Ransomware may be finally losing its popularity among cybercriminals, who instead are increasingly turning to cryptojacking, research has claimed.

The post Cryptojacking takes over from ransomware as cybercriminal’s choice appeared first on The Cyber Security Place.

Outdated cyber defences putting companies at risk

Legacy systems are no match for ransomware and other new cyber threats.As cyber threats such as phishing, malware and cryptojacking have grown increasingly sophisticated, new research has revealed that legacy

The post Outdated cyber defences putting companies at risk appeared first on The Cyber Security Place.

Security is the biggest driver and obstacle in hybrid cloud migrations

Just 16% of enterprises use just one cloud, with two-thirds having a strategy in place for a hybrid approach, according to a new report.Companies in the early stages of cloud

The post Security is the biggest driver and obstacle in hybrid cloud migrations appeared first on The Cyber Security Place.

Qualys integrates with Google Cloud Platform’s Security Command Centre

Qualys and Google Cloud Platform can now play nicely together with the launch of the security firm’s Cloud Security Command Center (Cloud SCC) integration.The security and data risk platform will

The post Qualys integrates with Google Cloud Platform’s Security Command Centre appeared first on The Cyber Security Place.

No-Brainer Strategies to Your Protect IT Infrastructure

According to a survey conducted by Kaspersky Lab and B2B International, 90% of businesses that answered admitted to experiencing a security threat to their IT infrastructure and 46% of them

The post No-Brainer Strategies to Your Protect IT Infrastructure appeared first on The Cyber Security Place.

Insurance and Corporate Vigilance Against Cyber Breaches: 5 Steps to Take in the Absence of Cross-Industry Protocols

Despite the lack of bright-line procedures, there are five risk reduction measures a company may consider implementing to reduce its potential exposure to cyber breaches, strengthen its security protocols, and

The post Insurance and Corporate Vigilance Against Cyber Breaches: 5 Steps to Take in the Absence of Cross-Industry Protocols appeared first on The Cyber Security Place.

Criminals Using Web Injects to Steal Cryptocurrency

Man-in-the-browser attacks targeting Blockchain.info and Coinbase websites, SecurityScorecard says.Criminals have deployed a variety of tactics in recent months to try and profit from the cryptocurrency boom.One of them is the

The post Criminals Using Web Injects to Steal Cryptocurrency appeared first on The Cyber Security Place.

Top Ten Ways to Detect Phishing

Despite being a tactic that pre-dates the internet, and recalls the days of scams surrounding depositing large amounts of money in your bank account, phishing remains a major problem of

The post Top Ten Ways to Detect Phishing appeared first on The Cyber Security Place.

Does Patching Make Perfect?

We’ve heard it time and time again: patches and updates are the key to mitigating vulnerabilities that lead to epic Equifax-sized breaches. The logic goes that security incidents can be

The post Does Patching Make Perfect? appeared first on The Cyber Security Place.

Understanding the Relationship Between AI and Cybersecurity

DaThe first thing many of us think about when it comes to the future relationship between artificial intelligence (AI) and cybersecurity is Skynet—the fictional neural net-based group mind from the

The post Understanding the Relationship Between AI and Cybersecurity appeared first on The Cyber Security Place.

DevOps Security Watch: Three Trends To Track In 2018

In the face of incessant competition, countless organizations are turning to DevOps to improve efficiency and accelerate innovation. While this approach delivers proven benefits, DevOps is also creating new security

The post DevOps Security Watch: Three Trends To Track In 2018 appeared first on The Cyber Security Place.

Global WAN survey highlights the importance of network simplification

Cato Networks, provider of the global SD-WAN as a service Cato Cloud, released the findings of its enterprise WAN market study.The report, “State of WAN 2018: Too Complex to Ignore,”

The post Global WAN survey highlights the importance of network simplification appeared first on The Cyber Security Place.

Malware leverages web injects to empty users’ cryptocurrency accounts

Criminals trying to get their hands on victims’ cryptocurrency stashes are trying out various approaches. The latest one includes equipping malware with Man-in-the-Browser capabilities so they can hijack online accounts

The post Malware leverages web injects to empty users’ cryptocurrency accounts appeared first on The Cyber Security Place.

Indecent Exposure: Could Wi-Fi Be Your Weakest Link?

Imagine you’d spent a fortune making your home physically secure, only to discover you’d been quietly robbed by thieves who never set foot on your property. You thought you’d built

The post Indecent Exposure: Could Wi-Fi Be Your Weakest Link? appeared first on The Cyber Security Place.

The Real Reasons Behind Your Web Security Woes

Why is it that so many people struggle to get their arms around web and application security? Some of the answers to this question are quite obvious, but others are

The post The Real Reasons Behind Your Web Security Woes appeared first on The Cyber Security Place.