The COVID-19 driven shift to remote working coupled with accelerated digital transformation poses significant challenges to enterprise cybersecurity operations, widening the threat landscape and exposing enterprise networks, devices and data to increasing cybersecurity risk. Unmanaged devices, shadow IT and rapidly deployed remote access networks have all introduced emerging vulnerabilities that are being exploited by cybercriminals, making securing the enterprise even more difficult for CSOs and their teams.
COVID-19 has initiated a whole new host of cybersecurity threats. Twitter was one of the latest victims, its employees allegedly being targeted so that hackers should take over the accounts of certain verified users. And just before that, a June 25 story in The New York Times detailed the way in which a foreign entity is attempting to infiltrate American business by taking advantage of remote employees whose organizations – more than 400 million worldwide – use virtual private networks (VPNs).
A new Digital Shadows report focuses on the escrow systems used on cybercriminal forums. These systems are deeply sophisticated, relying not just on similar technological mechanisms as traditional ecommerce, but on social, community oriented mechanisms as well, such as arbitration.
Google has admitted that its Home speakers recorded users at all times, even when they hadn't said "wake words" such as "OK Google," due to a security error earlier this year.
Six out of ten businesses target geographic diversification of supply chains to build resilience.
August 11, 2020
According to the Supply Chain Resilience Report 2020 from 3D Hubs, cybersecurity issues have affected less than 10% of firms over the past 10 years, compared to 60% that have suffered directly as a result of COVID-19 disruption.
Massachusetts Governor Charlie Baker signed an act which authorizes up to $1.8 billion in capital funding for key investments in public safety, food security, and information technology.
A new study reveals that 93 percent of security professionals lack the tools to detect known security threats, and 92 percent state they are still in need of the appropriate preventative solutions to close current security gaps.
By looking at hospitals – and the resulting mad scramble and actions they took to protect their patients – there are four lessons that can be distilled to help those in the thick of a spike or for those planning for the next surge.