October 9, 2023
Via: CSO OnlineThe point at which quantum computers will be capable of breaking existing cryptographic algorithms — known as “Q-Day” — is approaching. It’s a juncture that’s been discussed for years, but with advancements in computing power, post-quantum threats are becoming very […]
August 7, 2023
Via: CSO OnlineAnyone in cybersecurity who has had to deal with vulnerabilities in technology systems has inevitably run into the Common Vulnerability Scoring System (CVSS). Whether or not the name is instantly recognizable, phrases determining vulnerabilities as “critical” or “high” or the […]
May 25, 2023
Via: CSO OnlineEarlier this year, ESG published a research report focused on how enterprise organizations use threat intelligence as part of their overall cybersecurity strategy. The research project included a survey of 380 cybersecurity professionals working at enterprise organizations (i.e., more than […]
April 6, 2023
Via: CSOWhen I asked CISOs about their cyber threat intelligence (CTI) programs about five years ago, I got two distinct responses. Large, well-resourced enterprises were investing their threat intelligence programs with the goal of better operationalizing it for tactical, operational, and […]
September 13, 2022
Via: CSOEnterprises monitored by CrowdStrike’s Falcon OverWatch threat hunters faced 77,000 attempts of hands-on, interactive intrusions, or approximately one potential intrusion every seven minutes, between July 1, 2021, and June 30, 2022—a 50% year-over-year increase, according to a new report from […]
January 16, 2020
Via: CSOThough threat actors have access to increasingly sophisticated and easy-to-use offensive tools, businesses often fail to get basics around patching right, leaving an easy entry route for attackers. As one of the biggest providers of building materials in the world, […]