Cyberinsurers looking for new risk assessment models

Cyberinsurers looking for new risk assessment models

As ransomware attacks increase, a number of difficulties have risen for cyberinsurers that will need to be addressed swiftly. Image: Adobe Stock The ever-increasing number of ransomware attacks has created a quandary for those in the cyberinsurance industry. With premiums skyrocketing, coverage being limited and insurers struggling to earn revenue because of the cost and growing number of claims, something has to give. Due to these factors, organizations are searching for new methods of risk…

Read More

ALL IN with Partners at Cisco Live

ALL IN with Partners at Cisco Live

Hard to believe it’s already been a month since Cisco Live!!! If you’re like me, you were thrilled to have a chance to see partners, customers, and colleagues again.  This was my first business trip since the pandemic, so I was completely overwhelmed on Sunday when I arrived in Las Vegas – but by Monday morning I was back in the swing of Partner Executive meetings, booth duty, and even engaging with Cisco customers in…

Read More

Risk management processes in US are falling behind

Risk management processes in US are falling behind

Risk management processes in US are falling behind | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Enterprises lack visibility into mobile app security

Enterprises lack visibility into mobile app security

Enterprises lack visibility into mobile app security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Why secure deployment operations management is critical for 5G

Why secure deployment operations management is critical for 5G

Why secure deployment operations management is critical for 5G | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Half of your staff are thinking about leaving: can upskilling help to retain them?

Half of your staff are thinking about leaving: can upskilling help to retain them?

Skills shortages have always been a fact of life for CIOs. Today, however, the labour market is tighter than ever, and CIOs face multiple challenges. Yet a recent survey by Pluralsight suggests that IT employers could do more to retain staff by upskilling them so that they can take on bigger and better roles. Here’s how the situation looks from the perspective of the IT professionals surveyed. Four out of 10 (37%) IT professionals are…

Read More

Fewer Fall Victim to Data Breaches as Attackers Switch to Business in 2022

Fewer Fall Victim to Data Breaches as Attackers Switch to Business in 2022

The number of people falling victim to data breaches has fallen back from last year’s record high, according to the Identity Theft Resource Center (ITRC), a US-based non-profit that provides identity crime advice. According to the H1 2022 Data Breach Analysis report, 2021 saw 1862 publicly reported breaches, with 851 in the first half of the year. This year saw H1 breaches drop back to 817 incidents. More significantly, the number of victims is down some 45% compared…

Read More

10,000 organisations targeted by phishing attack that bypasses MFA

10,000 organisations targeted by phishing attack that bypasses MFA

Microsoft has shared details of a widespread phishing campaign that not only attempted to steal the passwords of targeted organisations, but was also capable of circumventing multi-factor authentication (MFA) defences. The attackers used AiTM (Attacker-in-The-Middle) reverse-proxy sites to pose as Office 365 login pages which requested MFA codes, and then use them to log into the genuine site. According to Microsoft’s detailed report on the campaign, once hackers had broken into email inboxes via the…

Read More

Material cybersecurity breaches increased 25% in 2021

Material cybersecurity breaches increased 25% in 2021

Material cybersecurity breaches increased 25% in 2021 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

How to remove your saved passwords in Chrome

How to remove your saved passwords in Chrome

Given Chrome’s frequent security issues, Jack Wallen strongly believes you shouldn’t be saving your passwords to Google’s browser. Learn how to delete and prevent passwords from re-syncing in Chrome. Image: kovop58/Adobe Stock For the longest time, I’ve been shouting to the sun and moon that no one should allow Chrome to save passwords. Given that almost monthly Google releases an announcement saying that users are strongly urged to upgrade to the latest version of Chrome…

Read More
1 2,836 2,837 2,838 2,839 2,840 4,072