Half (49%) of U.S. WFH employees say they continue to use their personal laptop or computer as they work remotely, according to Morphisec’s 2021 WFH Employee Cybersecurity Threat Index. The second annual study found enterprise employees remain worryingly reliant on non-hardened personal devices for work activities 16 months after the pandemic forced them to go remote.
Secure and reliable utility operations are vital to national security across the globe. The frequency of attacks on critical infrastructure is rapidly rising, not just in the U.S., but across the globe. Here’s what security leaders can do to protect utilities.
Two new ransomware groups - BlackMatter and Haron - have emerged this July 2021, soon after the sudden disappearance of top-tier ransomware threat actors DarkSide and REvil.
Contra Costa County determined that it needed video technology that would help the Emergency Operations Center improve situational awareness and increase efficiency.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), the United Kingdom’s National Cyber Security Centre (NCSC), and the U.S, Federal Bureau of Investigation (FBI), have co-authored a new advisory which provides details on the top 30 vulnerabilities—primarily Common Vulnerabilities and Exposures (CVEs)—routinely exploited by malicious cyber actors in 2020 and those being widely exploited thus far in 2021.
Security spoke to Joey Johnson, Chief Information Security Officer of Premise Health, a direct healthcare provider, about how healthcare security leaders can keep up with rising cybersecurity threats.
While the Kaseya, SolarWinds and other cyberattacks and global disruptors may appear dissimilar, having wildly varying causes and impacts, there is strategic value in considering them – and the supply chains they spread across – as a collective. Together, they represent a rapid learning opportunity for both adversaries and defenders – an open-source global weapons development program.
Oftentimes, security leaders and organizations need more clarification about the types of cybersecurity assessment services. Let's look at the goal of each service, its scope and the methodology used.
IT executives and senior leaders are key drivers of success. For an organization to quickly realize a tech vision and reap the benefits of digitization, leaders must have cutting-edge technical knowledge, a shared vision for change and, most critically, a people-focused approach that empowers the organization now and in the future.