War in Ukraine Has Pushed Two-Thirds of Businesses to Change Cyber Strategy

War in Ukraine Has Pushed Two-Thirds of Businesses to Change Cyber Strategy

After six months of war in Ukraine, nation-sponsored cyber-warfare continues to be top of mind for security decision makers. Nearly two-thirds (64%) of organizations believe they have been targeted, or at least impacted, by a nation-state cyberattack, according to a report published by Venafi on Wednesday, August 24, 2022. The research also found that, while 64% think the threat of physical war is a greater concern in their country than cyber-war, 68% have had more conversations…

Read More

Guarantee that Your Enterprise Will Recover from a Ransomware or Malware Cyberattack

Guarantee that Your Enterprise Will Recover from a Ransomware or Malware Cyberattack

A cyberattack hits an enterprise. The CEO wants answers; the CFO is worried about the economic impact; the COO fears a halt to operations, and the CMO prepares to handle the fallout and customer impact. An emergency meeting in the corporate boardroom is called. Calmly and confidently, the CIO walks into the room and informs the C-suite that the recovery of the enterprise’s data will start immediately – yes, in a minute or less –…

Read More

How ransomware attacks target specific industries

How ransomware attacks target specific industries

Analyzing over 100 prominent ransomware incidents, Barracuda found the top targeted sectors to be education, municipalities, healthcare, infrastructure and financial. Image: nevarpp, Getty Images/iStockphoto Must-read security coverage Ransomware attacks can impact any type of organization in virtually any sector. But, some industries have proven to be more tempting targets for cyber criminals. In a report released Wednesday, August 24, security provider Barracuda discusses which types of companies have been in the crosshairs of ransomware and…

Read More

Cisco Software-Defined Access for Industry Verticals

Cisco Software-Defined Access for Industry Verticals

Overview Cisco Software-Defined Access (SD-Access) is the evolution from traditional campus designs to networks that directly implement the intent of an organization. SD-Access is a software application running on Cisco DNA Center hardware that automates wired and wireless campus networks with LISP as the control plane and VXLAN for encapsulation. Fabric technology, an integral part of SD-Access, provides wired and wireless campus networks with programmable overlays and easy-to-deploy network virtualization, permitting a physical network to…

Read More

(ISC)²: Cyber professionals want remote work

(ISC)²: Cyber professionals want remote work

(ISC)²: Cyber professionals want remote work | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

California ADCA bill aims to increase children’s data privacy

California ADCA bill aims to increase children’s data privacy

California ADCA bill aims to increase children’s data privacy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Iranian cyberespionage group uses new Hyperscrape tool to extract emails from victims’ mailboxes

Iranian cyberespionage group uses new Hyperscrape tool to extract emails from victims’ mailboxes

Learn more about a new Iranian tool dubbed Hyperscrape and how it is used by a cyberespionage group to extract content from victims’ inboxes. Getty Images/iStockphoto Must-read security coverage Charming Kitten, also known as APT35 and Magic Hound, is a state-sponsored threat actor originating from Iran that has been active for about 10 years already. The threat actor has targeted government and military personnel, academics and journalists in the U.S. and Middle East. Their goal…

Read More

Embrace an Integrated Network Security Infrastructure

Embrace an Integrated Network Security Infrastructure

To stay competitive and meet user demands, organizations are adopting new technologies and architectures—such as software-defined WAN (SD-WAN), software-defined branch (SD-branch), Internet-of-Things (IoT), multi-cloud, and zero-trust access (ZTA)—which has led to network infrastructures becoming increasingly complex and fragmented. To help mitigate this operational complexity, enterprises are embracing the simplicity and efficiency of an integrated architecture. Network integrations enable zero-touch provisioning, centralized management, real-time security analytics, simplified compliance auditing and reporting, and automation of manual workflows…

Read More

Mobile app helps keep San Diego State University students safe

Mobile app helps keep San Diego State University students safe

Mobile app helps keep San Diego State University students safe | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Mis-, dis- and mal-information insider threats: Building cognitive immunity

Mis-, dis- and mal-information insider threats: Building cognitive immunity

Mis-, dis- and mal-information insider threats: Building cognitive immunity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2,775 2,776 2,777 2,778 2,779 4,112