The role of the chief information security officer – or CISO for short – is to understand a corporation’s cyber threat landscape and know where vulnerabilities lie. And given the relentless increase in sophisticated hacking, their clout and importance to the CEO and Board is increasing exponentially.
What is causing digital fraud to rise year over year? From current trends and consumer attitudes to technological enhancements and more sophisticated tactics, let’s take a look at the top nine reasons digital fraud is rapidly increasing:
Organizations' migration to the cloud is a broad term that encompasses many different trends: (1) Moving existing applications from private data centers to AWS, Azure, or the Google Cloud Platform as cloud service providers (CSPs), often referred to as lift-and-shift or infrastructure-as-a-service (IaaS); (2) Completely restructuring how applications are built to make heavier use of prepackaged services available on these cloud service platforms – often referred to as lift-and-reshape, serverless, or platform-as-a-service (PaaS); (3) Choosing to forgo running copies of standard applications instead of having the application vendor host them is sometimes referred to as drop-and-shop or software-as-a-service (SaaS).
With the emergence of major public health issues, or crises, such as COVID-19, grant funding for research and program development will be made available from various government agencies to help with the response. Additionally, foundations such as the Bill & Melinda Gates Foundation or Ford Foundation may provide the precious funds to perform the vital work to battle the at hand issue. If fortunate, those in receipt of funding to pursue the global health issue to be addressed will often utilize technology either developed or custom created and implemented to address the critical response, or in the case of COVID-19, slow the spread or research the creation of vaccines.
Security alerts are imperative for effectively mitigating and preventing cyberattacks. But, a key challenge of modern threat protection solutions is the sheer number of alerts they generate – leading to “alert fatigue.”
To learn more about the dangers of alert fatigue, we talk to Mark Kedgley, CTO at New Net Technologies (NNT).
While the technical root causes are the same, the impact of an IoT botnet attack on consumer versus enterprise and industrial devices is vastly different. An attack on a consumer gadget could be limited to a privacy issue, whereas the effect of a successful breach on a commercial device can have a significant production or safety cost. That’s why it’s more critical than ever for IT and OT security professionals to understand and be prepared to defend against this growing threat.
One type of social engineering attack is the personalized-message, which often ends up in the hands of the CEO or another executive who would have access to sensitive files and information. Until recently, email was the dominant medium by a wide margin. However, recently, attackers have started to move to social media and text messages. What can you do about it?
State and federal governments are enacting emergency rules, health standards, and legislation to respond to the COVID-19 pandemic. Canada rolled out new border measures in October. Vermont officials now require residents and non-residents coming from outside the select states, or counties within select states, to quarantine for 14 days. In Illinois, the governor declared all counties a disaster area.
It’s a common occurrence during a public health emergency — but it makes planning travel a complex task.
IP intercom solutions have emerged as a “must have” security solution for new and established facilities to protect people, assets, and property. A key component of an IP intercom solution, however, is its ability to provide intelligible communications to allow your security team to see beyond video and to protect employees and visitors from seen and unseen threats. What are 12 questions that you should ask before selecting an IP intercom solution?
Security directors across all sectors have been focused on evaluating existing infrastructures and adapting to new health and safety guidelines. COVID-19 worked as a catalyst for increasing customer demand and interest in visitor and tenant monitoring and management. Beyond simply gaining access to a facility, common areas - such as gyms, office kitchens or conference rooms and laundry spaces - will be considered high-risk for occupancy management, presenting new challenges in promoting social distancing.