#InfosecurityEurope2022: Actions Not Words: Hacking the Human Through Social Engineering

#InfosecurityEurope2022: Actions Not Words: Hacking the Human Through Social Engineering

Social engineering will drive a new generation of threats, as cyber and physical security converge. Criminal hackers will use keystroke loggers and USB sticks alongside IT-based attacks to gain access and information. And bad actors will always be on the lookout for human weaknesses. This was the message Jenny Radcliffe, The People Hacker, delivered to Infosecurity Europe 2022, as she was inducted into the Infosecurity Hall of Fame. With over 30 years as a social…

Read More

5 top tips to protect yourself from cybercrime by Ty the Cyber Guy

5 top tips to protect yourself from cybercrime by Ty the Cyber Guy

This blog comes to us from Tyrone Harmon – aka “Ty the Cyber Guy” – an influential voice in cybersecurity, with an active presence on social media with his video series #CybersecuriTEA. Ty is a Cybersecurity Specialist at Cisco and the fantastic host for Cisco Networking Academy’s #BeCyberSmart virtual event on June 30, 2022. Ty will be joined by Josh McCloud, National Security Manager at Cisco, and Semyon Ovsyannikov, an education and technology expert with Cisco…

Read More

Simplifying Security for the Hybrid Working World

Simplifying Security for the Hybrid Working World

Cybersecurity is at an inflection point. The move to remote working and the endpoint vulnerabilities that go with it are a permanent part of the new normal. There are multiple factors causing organizations to rethink their security strategies. For example, ransomware is now a successful business model for a new breed of smart, deep-pocketed bad actors. Also, it is difficult and costly to find and retain cybersecurity professionals with the expertise to protect enterprise data…

Read More

#InfosecurityEurope2022: Firms Look To Align Security and Business Risk

#InfosecurityEurope2022: Firms Look To Align Security and Business Risk

Boards will increase spending on cybersecurity, but only if they see wider benefits to the business, according to CISOs. Speaking on a keynote panel at Infosecurity Europe 2022, they argued that organizations need to see more than an absence of successful cyber-attacks to justify spending on personnel and security tools. They need to know that the spending is supporting business goals, or in the government and not-for-profit sectors, delivering value for money. In addition, CISOs…

Read More

Anomali Launches Differentiated Cloud-Native XDR SaaS Solution with Support from AWS SaaS Factory

Anomali Launches Differentiated Cloud-Native XDR SaaS Solution with Support from AWS SaaS Factory

Click here for more information on AWS Partner Network blog. By Ranjith Raman, Sr. Partner Solutions Architect – AWSBy Oded Rosenmann, Global Practice Lead, SaaS Partners – AWS Organizations are increasingly looking for new ways to defend themselves against cyber threats, fraud, and ransomware attacks. Many enterprises and government agencies turn to cyber security solutions that provide efficient and effective detection and response capabilities to proactively prevent attackers from breaching their networks and applications. To help organizations…

Read More

Private 5G promising for enterprises, but growth stymied by pandemic, lack of hardware

Private 5G promising for enterprises, but growth stymied by pandemic, lack of hardware

Private 5G networks promise to offer low latency, high reliability, and support for massive numbers of connected devices, but enterpise deployment has been slower than expected, experts say, due to the pandemic and a slow-to-evolve device ecosystem. IDC reports that the global private LTE and 5G wireless infrastructure market totaled $1.8 billion in revenue in 2021 and will increase to $8.3 billion by 2026, but that spending will grow “slower than expected” in the next…

Read More

Computer vision is primed for business value

Computer vision is primed for business value

Over the past few years, computer vision applications have become ubiquitous. From phones that recognize the faces of their users, to cars that drive themselves, to satellites that track ship movements, the value of computer vision has never been clear. But hardware shortages and labor disruptions in the pandemic’s wake are challenging companies’ ability to make good on the promise of computer vision, even as the pandemic itself has accelerated the potential of its use…

Read More

3 CIOs-turned-board-members on raising your leadership profile

3 CIOs-turned-board-members on raising your leadership profile

Boards today are adding CIOs and CDOs to increase their digital savvy — and for good reason: Digitally savvy boards significantly outperform others on key metrics. But getting there, and being a differentiator once you’re there, requires CIOs to stretch their skills. On a recent episode of the Tech Whisperers podcast, I sat down with three remarkable C-level leaders who are currently serving on boards of directors—Julie Cullivan, who’s held CIO-plus roles at Forescout and…

Read More

Cloud Email Threats Soar 101% in a Year

Cloud Email Threats Soar 101% in a Year

The number of email-borne cyber-threats blocked by Trend Micro surged by triple digits last year, highlighting the continued risk from conventional attack vectors. The vendor stopped over 33.6 million such threats reaching customers via cloud-based email in 2021, a 101% increase. This included 16.5 million phishing emails, a 138% year-on-year increase, of which 6.5 million were credential phishing attempts. Trend Micro also blocked 3.3 million malicious files in cloud-based emails, including a 134% increase in…

Read More
1 2,963 2,964 2,965 2,966 2,967 4,142