Unauthorized enterprise Software as a Service (SaaS) applications can present cybersecurity risks to a business. Gaining visibility into SaaS apps is key.
Software Bill of Materials (SBOM) are a critical tool in protecting enterprise and government organizations from software supply chain security threats.
Researchers at Cleafy discovered a version of SOVA that appears to be targeting more than 200 mobile applications, including banking apps and crypto exchanges/wallets.
The BlackBerry Cyber Insurance Coverage study surveyed 450 information technology (IT) and cybersecurity decision-makers about their cyber insurance coverage and ransomware protection levels.
Default security configurations, weak passwords and human error are the top vectors for cyberattackers targeting enterprise networks. Penetration testers share how to avoid these cyber risks.
For chief information security officers (CISOs) and their organizations, the question is not if the cybersecurity budget should be cut. It's how much risk they are willing to take.
Employee monitoring needs to be approached correctly. Too often, poorly constructed plans, bad communication and unreasonable expectations get in the way of a successful implementation.
By understanding how intelligence officers have traditionally recruited, assessed and developed spies for decades, security leaders can harden their organizations to bad actors.
Understanding how bad actors recruit and develop employees to share information can allow security leaders to harden their organizations against the threat of social engineering.