WFH is a cybersecurity

WFH is a cybersecurity

IT teams are experiencing employee pushback due to remote work policies and many feel like cybersecurity is a “thankless task” and that they’re the “bad guys” for implementing these rules. GettyImages/Petri Oeschger At the onset of COVID-19, companies around the globe shifted to remote work on short notice.  The revamped operations transformed the traditional workday and cybersecurity efforts for companies virtually overnight, leading to new challenges for remote workers and IT teams. On Thursday, HP…

Read More

Security Now a “Thankless Task” For 80% of IT Teams

Security Now a “Thankless Task” For 80% of IT Teams

Securing the new hybrid workplace may require significant changes to culture, policy and technology after new HP research revealed significant pushback from remote workers during the pandemic. The tech giant surveyed over 1000 IT decision-makers and more than 8400 workers across the globe to compile its latest HP Wolf Security study, Rebellions & Rejections. It revealed that nearly all (91%) IT leaders had felt pressure to compromise on security during the pandemic, with three-quarters (76%) admitting security took…

Read More

Attacker Breakout Time Now Less Than 30 Minutes

Attacker Breakout Time Now Less Than 30 Minutes

The average time it takes threat actors to move from initial access to lateral movement has fallen by 67% over the past year, putting extra pressure on security operations (SecOps) teams, according to CrowdStrike. The findings come from the security firm’s own investigations with customers across around 248,000 unique global endpoints. For incidents where this “breakout time” could be derived over the past year, it averaged just 1 hour 32 minutes. However, in over a third (36%) of…

Read More

Berners-Lee Joins ProtonMail Following Privacy Debacle

Berners-Lee Joins ProtonMail Following Privacy Debacle

Tim Berners-Lee has joined the advisory board of ProtonMail, just days after the encrypted email service was criticized for unmasking the identity of a user for French police. The worldwide web inventor was a scientist at the European Organization for Nuclear Research (CERN) at the same time as ProtonMail CEO Andy Yen, and helped to sketch the initial plans for what is now the world’s largest encrypted email service, with over 50 million users. “I’m…

Read More

How Groove Gang is Shaking up the Ransomware-as-a-Service Market to Empower Affiliates

How Groove Gang is Shaking up the Ransomware-as-a-Service Market to Empower Affiliates

Co-authored with Intel471 and McAfee Enterprise Advanced Threat Research (ATR) would also like to thank Coveware for its contribution. Executive Summary McAfee Enterprise ATR believes, with high confidence, that the Groove gang is associated with the Babuk gang, either as a former affiliate or subgroup. These cybercriminals are happy to put aside previous Ransomware-as-a-Service hierarchies to focus on the ill-gotten gains to be made from controlling victim’s networks, rather than the previous approach which prioritized…

Read More

AI pivotal for forensic investigative teams to handle crushing data volumes

AI pivotal for forensic investigative teams to handle crushing data volumes

AI pivotal for forensic investigative teams to handle crushing data volumes | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

CIS Control 3: Data Protection – Protect and Identify to safeguard data

CIS Control 3: Data Protection – Protect and Identify to safeguard data

For many years, there was a wide misunderstanding that encrypting some data is equivalent to protecting that data. If it’s encrypted, so the thinking goes, nobody else could access it, and it is therefore safe. While it is critical to encrypt data at rest as well as in transit, the job of protecting data goes much deeper. Encryption can mitigate risk from certain attack scenarios such as physically compromised hardware or a tapped network link,…

Read More

CIS Control 3: Data Protection – Protect and Identify to safeguard data

CIS Control 3: Data Protection – Protect and Identify to safeguard data

For many years, there was a wide misunderstanding that encrypting some data is equivalent to protecting that data. If it’s encrypted, so the thinking goes, nobody else could access it, and it is therefore safe. While it is critical to encrypt data at rest as well as in transit, the job of protecting data goes much deeper. Encryption can mitigate risk from certain attack scenarios such as physically compromised hardware or a tapped network link,…

Read More

Enhancing cybersecurity skills for the entire workforce must be a priority for cyber-resilience

Enhancing cybersecurity skills for the entire workforce must be a priority for cyber-resilience

Technology is not the only answer: An expert suggests improving the human cyber capacity of a company’s workforce plus cybersecurity technology offers a better chance of being safe. Image: iStock/vadimrysev Risk resulting from a cybersecurity event affects the entire organization. “As such, the cyber workforce—those responsible for preventing and responding to an attack—are no longer limited to just ‘the geeks in the basement,’” said James Hadley, CEO and founder of Immersive Labs, in an email…

Read More

Shoring up Network Access Policy Management in the Calm Before the IoT Storm – Cisco Blogs

Shoring up Network Access Policy Management in the Calm Before the IoT Storm – Cisco Blogs

With some research forecasting that more than 75 million IoT devices will be deployed globally by 2025, enterprise IT administrators have a huge challenge on their hands: How to manage network access policies between so many users, devices, and networks with diverse access privileges. To date, mostly manual point solutions have been used to broadly enforce network access policies. They’re expensive, time-consuming, and inefficient. The clock is ticking. Devices are proliferating. Cybercrime cost the world…

Read More
1 3,516 3,517 3,518 3,519 3,520 3,964