SonicWall Capture Labs threat researchers unveiled third-quarter threat intelligence collected by the company’s more than 1 million global security sensors. Year-to-date findings through September 2020 highlight cyber criminals’ growing use of ransomware, encrypted threats and attacks leveraging non-standard ports, while overall malware volume declined for the third consecutive quarter.
In this ongoing virtual environment, organizations remain highly vulnerable to the significant cybersecurity risks exposed by widespread remote work - business email compromise (BEC), in particular. How did business email compromise become such a serious threat for organizations, and why should cyber insurance be top of mind right now, as a result? Let’s dive in.
With the healthcare industry expected to spend $125 billion on cybersecurity from 2020 to 2025, dollars must be spent for maximum efficiency. The question is, how to allocate those funds most effectively at a time when cybercriminals have placed a huge target on hospitals, research labs, pharmaceuticals and insurance carriers.
Organizations need to take a layered approach to security to protect their organizations and sensitive patient data. The smartest approach is to start at the perimeter and work back toward existing enterprise protections – here’s how to do that.
During its Cybersecurity Perspectives forum kicking off, power management company Eaton announced it is the first company to have its product development processes certified by both the International Electrotechnical Commission (IEC) and global safety science organization UL.
IoT plays an important role that allows enterprises to go through digital transformation. However, in many cases organizations start to become aware that they do already have a large number of IoT devices which were introduced gradually over the years. One of the main concerns that an organizations face when dealing with IoT is managing risks involved in increasing number of IoT devices. Because of their ability to interact with the physical world, there are safety and privacy concerns when it comes to the security of IoT devices.
This paper provides an overview of IoT components, followed by risks and sample attacks. Finally, a list of current and prospective future security solutions is discussed.
An online platform designed to help IoT vendors receive, assess, manage and mitigate vulnerability reports has been launched by the IoT Security Foundation (IoTSF). VulnerableThings.com aims to simplify the reporting and management of vulnerabilities while helping IoT vendors comply with new consumer IoT security standards and regulations.
Online games and specifically the Massive Multi-Player (MMO) games, experience multiple attacks from hackers, platform competition that try to block players’ access to the gaming platforms, as well as cheating players that can attack other players slowing their connection, while gaining a competitive advantage. These attacks can take the entire game offline, resulting in hundreds of thousands of dollars lost, according to Radware’s threat research team.
New research finds that the main difference between those who were successful in moving their Zero Trust initiatives forward were those that started out with formalized Zero Trust projects. Those that had dedicated budgets and formal initiatives (69%) were far more likely to continue accelerating those projects throughout the pandemic, while those that had ad hoc Zero Trust projects were more likely to stall progress or stop entirely.
Traditional Enterprise Data loss prevention (DLP) tools were not initially designed for protecting unstructured data, and encryption and policy are not centralized and few have taken advantage of improvements in recent years. In the meantime, unstructured data has piled up and is growing.
To target this problem, a new set of vendors and products emerged with “data-centric” solutions adding to the confusion. So many vendors with a variety of capabilities to choose from, but how do you know which is right? What vendor do you choose? The answer to these questions is to think more about what you want to accomplish and weigh the approaches first.
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Cyber Command Cyber National Mission Force (CNMF) identified tactics, techniques, and procedures (TTPs) used by North Korean advanced persistent threat (APT) group Kimsuky to gain intelligence on various topics of interest to the North Korean government.