Advertisement
Top

Tag: information security


Security

US DOD’s CMMC 2.0 rules lift burdens on MSPs, manufacturers

January 5, 2024

Via: CSO Online

New cybersecurity rules for US Department of Defense (DOD) contractors are entering the home stretch. The rules, which establish a comprehensive and scalable assessment mechanism within the agency’s Cybersecurity Maturity Model Certification (CMMC) program, aim to ensure that contractors and […]


Security

How to maintain a solid cybersecurity posture during a natural disaster

November 30, 2023

Via: CSO Online

It’s common knowledge that natural disasters are increasingly threatening more and more of the world and in places that were once thought of as safe from the ravages of nature. According to the US National Oceanic and Atmospheric Administration, there […]


Security

9 in 10 organizations have embraced zero-trust security globally

November 22, 2023

Via: CSO Online

Nearly 90% organizations have begun embracing zero-trust security, but many still have a long way to go, according to a report by multinational technology company Cisco. The report, based on a survey of 4,700 global information security professionals, found that […]


Security

New Trojan ZenRAT masquerades as Bitwarden password manager

September 28, 2023

Via: CSO Online

Researchers have come across a new Trojan program dubbed ZenRAT that is being distributed as an installer for the popular Bitwarden password management application, as well as employing other tricks to deceive users. The Trojan has information-stealing capabilities and hasn’t […]


Security

Insider risks are getting increasingly costly

September 20, 2023

Via: CSO Online

The potential monetary losses from security incidents caused by insider activity — purposeful or accidental — is sharply on the rise, as businesses continue to misunderstand the threat they pose. According to a report released today by AI-based risk management […]


Security

New CISO appointments 2023

July 21, 2023

Via: CSO Online

The upper ranks of corporate security are seeing a high rate of change as companies try to adapt to the evolving threat landscape. Many companies are hiring a chief security officer (CSO) or chief information security officer (CISO) for the […]


Security

Security culture improving in businesses despite factors holding teams back

June 15, 2023

Via: CSO Online

The vast majority of CISOs have observed positive security culture gains in their organizations in the last year despite a perceived dip in the quality of overall security posture, according to the 10th annual Information Security Maturity Report published by […]


Security, Software, Technology

The 4 inexcusable failures of legacy backup tools

June 8, 2023

Via: CSO Online

Are you still relying on legacy backup tools to protect your data from modern cyberthreats? Legacy backups were created with natural disasters in mind, not cyber threats such as ransomware. Attackers often target backups because if you can’t safely restore […]


Security

Evil digital twins and other risks: the use of twins opens up a host of new security concerns

May 10, 2023

Via: CSO Online

The use of digital twins — virtual representations of actual or envisioned real-world objects — is growing. Their uses are multifold and can be incredibly helpful, providing real-time models of physical assets or even people or biological systems that can […]


Security

The evolution of security service edge (SSE) and zero trust

April 27, 2023

Via: CSO Online

With the recent publication of Gartner’s updated Magic Quadrant for Security Service Edge, we have been asked by several CXOs about this fast-growing solution category and how it relates to zero trust. The short answer is that they are closely […]


Security

7 cybersecurity mindsets that undermine practitioners and how to avoid them

April 17, 2023

Via: CSO Online

It’s no secret that cybersecurity jobs are burning people out. It’s a high-pressure environment that ever seems to be ratcheting up the daily demand on security professionals. There are many reasons for this, but underlying them all is the way […]


Security

Can a quantum algorithm crack RSA cryptography? Not yet

March 14, 2023

Via: CSO

Every CISO has encryption implementation decisions to make at a variety of levels and instances as they sort the support needed for business operations such as production, sales, support, data retention, and communication. These decisions tend to lean heavily on […]


Security

How CISOs can manage the cybersecurity of high-level executives

January 19, 2023

Via: CSO

High-level executives, including board members and C-level executives, often have access to sensitive information, making them prime targets for bad actors looking to penetrate corporate defenses. Their personal devices, among other points of entry, are glaring attack vectors for cybercriminals […]


Security

Securing Critical Infrastructure with Zero Trust

January 19, 2023

Via: CSO

Critical infrastructure forms the fabric of our society, providing power for our homes and businesses, fuel for our vehicles, and medical services that preserve human health. With the acceleration of digital transformation spurred by the pandemic, larger and larger volumes […]


Security

6 Questions to Ask Before You Hire a Managed Security Services Provider

November 21, 2022

Via: CSO

Gartner forecasts that information security spending will reach $187 billion in 2023, an increase of 11.1% from 2022. In tandem with this spending, the analyst firm also predicts that by 2025, a single centralized cybersecurity function will not be agile […]


Security

8 hallmarks of a proactive security strategy

October 25, 2022

Via: CSO

CISOs have long been tasked with building response and recovery capabilities, the objective being to have teams that can react to a security incident as quickly as possible and can restore business functions with as little damage as possible. The […]


Monitoring&Analysis, Security

Assessing Network Analysis and Visibility Solutions for Zero Trust

June 13, 2022

Via: CSO

The rising trend of zero trust implementation is a direct reaction to increasingly sophisticated cyberattacks. Zero-trust principles foster more effective threat detection because they reject the notion that security happens at the perimeter and that all network traffic is legitimate […]


Security

What is the cyber kill chain? A model for tracing cyberattacks

April 14, 2022

Via: CSO

As an infosec professional, you’ve likely heard about using a cyber kill chain to help identify and prevent intrusions. Attackers are evolving their methods, which might require that you look at the cyber kill chain differently. What follows is an […]


Security

Top cybersecurity M&A deals for 2022

January 14, 2022

Via: CSO

The number of cybersecurity mergers and acquisitions deals in 2021 set a record pace. The first three quarters of the year saw 151 transactions in the industry, according to 451 Research. That’s up from 94 for the same period in […]


Monitoring&Analysis, Security

4 Steps to Integrate Threat Intelligence into Your Security Operations

February 10, 2021

Via: CSO

Managing threat intelligence is like walking on a tightrope. To stay steady, you have to maintain balance between too little intelligence and too much; you run the risk of toppling off that tightrope and injuring the business, metaphorically speaking. If […]