As global tensions continue to escalate, the Internet may find itself used as a weapon, something we are already starting to see happen, by nations attempting to exert their influence and enforce greater internal control over digital commerce and communication. Nations must recognize the threat of escalation beyond the point of no return and take steps to ensure that the interconnectivity of the open Internet remains intact long-term. This will prevent a “cyber dark age” in which governments implement national Internet protocols and stop the free flow of data across borders.
Dr. Chase Cunningham, a recipient of Security magazine's Most Influential People in Security, has joined Ericom as its Chief Strategy Officer. In this role, he will shape the company's strategic vision, roadmap and key partnerships. Dr. Cunningham previously served as vice president and principal analyst at Forrester Research, providing strategic guidance on Zero Trust, artificial intelligence, machine learning and security architecture design for security leaders around the globe.
Radware's Vulnerability Research Team explored 2020's top 10 most prevalent exploits targeting web services leveraged in large scale attacks or reconnaissance campaigns as seen by Radware’s Threat Research Center.
It’s within this expanded terrain for cyberattacks that the security trends of 2021 and beyond are taking shape. Workers are engaging with company resources from diverse locations. At the same time, businesses have ramped up their digitalization journeys to be more flexible and agile after COVID-19’s disruption of supply chains. The result is a dynamic tech environment where the continuity of business operations – and ultimately market competitiveness – will rely on robust cyber protections.
To close out the year, U.S. telecommunications giant T-Mobile announced it had been hacked. In a notice, the company said its cybersecurity team had discovered and shut down malicious, unauthorized access to some information related to T-Mobile accounts.
Tried-and-true protocols don't work or can't be enforced during a global health crisis. Emergency disaster planning must now expand to consider insufficient hospital capacity, workforce shortages, delays in supplies and materials, and funding shortfalls. Ensure your organization is prepared for the next disaster with these six tips.
I have been in the cybersecurity industry for more than 20 years now. I have founded, operated, and exited several cybersecurity startups. I also advised, invested in, and even acquired a handful. Despite successful outcomes, my experience has left me perhaps a little jaded. Are we winning the battle? When I log into my various web accounts, I am so often reminded that my password had been stolen, sometimes alongside with my personal information. Even major financial institutions and government agencies have suffered a similar fate. Cybersecurity is broken, and here is why.
Lessons are best learned when we don’t expect them. When someone proselytizes us or pontificates, our defenses go up. Therefore, the best time to influence someone is when their guard is down.
Threat actors who phish see themselves as businesspeople, even if that business is illegal. They’re always seeking ways to maximize their profits, and with phishing, they know they can do that by better tailoring the email lure to resonate with the intended recipient.
As we changed the way we work, cybercriminals followed because the modern criminal is constantly evolving in line with shifts in online behavior and trends. As we prepare to welcome 2021, what trends can we expect from the cyber world?