Whenever I read about a data breach, I immediately smell a cybersecurity process failure. In cybersecurity, we sure love our processes. We have them for firewalls, intrusion detection systems, IP scans, pen testing, zero trust architecture, and double secret two factor authentication probation, but I’m going to dive into the most exciting process we […]
Phishing attacks have ramped up since the start of the pandemic with the majority of workforces transitioned to a remote setting. Spear phishing has particularly seen an increase and can be even more harmful due to its targeted approach. Hackers target and personalize messages to a specific individual, group, or organization in a spear phishing […]
Cybersecurity is less about what a business’ IT team does and more about the decision-making process. The growing risks to online security mean that leaders need to make wiser business decisions and rethink strategies that affect cybersecurity. Whether it’s working with contractors, upgrading software, or staying up to date with the latest threats, these are […]
A new International Data Corp. (IDC) survey found that more than one-third of organizations worldwide have experienced a ransomware attack or breach that blocked access to systems or data in the previous 12 months. And for those that fell victim to ransomware, it is not uncommon to have experienced multiple ransomware events.
As enterprises respond to the acceleration of remote working, hybrid cloud adoption continues to increase—but security remains a persistent blocker. Marcella Arthur, Vice President of Global Marketing at Unbound Security, looks at how emerging approaches to key management are enabling enterprises to rethink and assert control over their cloud strategies.
IBM Security announced the results of a global study which found that data breaches now cost surveyed companies $4.24 million per incident on average—the highest cost in the 17-year history of the report. Based on in-depth analysis of real-world data breaches experienced by over 500 organizations, IBM said the study suggests that security incidents became more costly […]
Scientists have created a cybersecurity technology called Shadow Figment that is designed to lure hackers into an artificial world, then stop them from doing damage by feeding them illusory tidbits of success. The aim is to sequester bad actors by captivating them with an attractive—but imaginary—world. The technology is aimed at protecting physical targets—infrastructure such […]
Though remote work started as a disaster response, businesses and employees alike have since noted the benefits that can come from working at home, including improved worker satisfaction, increased productivity, reduced commute times, and lower overheads. However, it’s important to acknowledge that alongside all of its advantages, remote work also has some ongoing issues, not […]
On May 9, the Federal Motor Carrier Safety Administration (FMCSA) issued a temporary exemption for commercial motor vehicles (CMVs) from hours of service (HOS) regulations to ensure adequate fuel supplies in several East Coast states following a cyberattack on the Colonial Pipeline.