Security Spending Doubles but Two-Fifths of Firms Suffer Breaches

Security Spending Doubles but Two-Fifths of Firms Suffer Breaches

Cybersecurity spending across the US and Europe has surged over the past year, but so too have security breaches, from 38% to 43% of businesses surveyed by Hiscox. The insurer’s annual Hiscox Cyber Readiness report has become a useful gauge of how mature and effective organizations’ cybersecurity strategies are. This year the firm engaged Forrester Consulting to poll over 6000 such companies across the US, UK, Belgium, France, Germany, Spain, the Netherlands and Ireland. It…

Read More

Venerable Linux distro Slackware comes back to life

Venerable Linux distro Slackware comes back to life

Being first doesn’t guarantee success in the technology industry. Remember the Netscape browser? Still, it can have its advantages, such as a different or unique approach to things. Such is the case with Slackware Linux. Slackware was the first formalized Linux distro, released in 1993, just two years after Linus Torvalds posted the Linux kernel. It was overtaken and overshadowed by Red Hat, SuSe, and Ubuntu, but it never went away. Now it’s coming out…

Read More

Average Ransom Surges 43% After Accellion Attacks

Average Ransom Surges 43% After Accellion Attacks

The average payment to ransomware groups has surged by 43% over the past quarter, driven by the threat actors behind the Accellion attacks, according to Coveware. The security vendor’s quarterly report for Q1 2021 revealed that the average ransom was $220,298 during the period, with data exfiltration now a major extortion tactic present in the vast majority (77%) of attacks, up 10% from the previous quarter. Yet while most ransomware groups simply steal data for…

Read More

COVID-19 Rattles Banks and Insurers as Security Budgets Are Slashed

COVID-19 Rattles Banks and Insurers as Security Budgets Are Slashed

Financial institutions in the US and UK cut security budgets by a quarter last year and saw cybercrime and fraud activity rise by about the same amount during the pandemic, according to new research from BAE Systems Applied Intelligence. The British cybersecurity and risk management firm engaged Atomik Research to poll nearly 1000 banks and insurers and 2000 consumers in the US and UK back in March, in order to better understand the impact of…

Read More

6 Common Threats to Securing AWS Management Configurations

6 Common Threats to Securing AWS Management Configurations

There’s a common misconception that cloud providers handle security, a relic leftover from hosting providers of previous decades. The truth is, cloud providers use a shared responsibility model, leaving a lot of security up to the customer. Stories of AWS compromise are widespread, with attackers often costing organizations many thousands of dollars in damages. Luckily, The Center for Internet Security has created the CIS Amazon Web Services Foundations benchmark policy, which provides guidance on best practice security configuration…

Read More

Data breaches and cyber attacks quarterly review: Q1 2021

Data breaches and cyber attacks quarterly review: Q1 2021

Welcome to our first quarterly review of cyber attacks and data breaches. For several years, we’ve produced a monthly list of security incidents, comprised of publicly disclosed breaches from mainstream publications. At the start of 2021, we decided to expand our research to learn more about the organisations that are being breached and how they were falling victim. We’ll present our findings at the end of each quarter, providing key statistics and observations. This includes…

Read More

Cybersecurity: A survival guide for 2021

Cybersecurity: A survival guide for 2021

Cybersecurity: A survival guide for 2021 | 2021-04-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Auto-pedestrian safety in parking garages

Auto-pedestrian safety in parking garages

Auto-pedestrian safety in parking garages | 2021-04-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

5 minutes with AJ Samuel – Why legal teams must quarterback data breach responses

5 minutes with AJ Samuel – Why legal teams must quarterback data breach responses

5 minutes with AJ Samuel – Why legal teams must quarterback data breach responses | 2021-04-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Creating Cloud Security Policies that Work | The State of Security

Creating Cloud Security Policies that Work | The State of Security

Now that the ongoing worldwide trend toward “going digital” has been accelerated by COVID-19, taking extra precautions to protect your organization’s data, communications and information assets is more important than ever. Of course, there are many traditional and emerging ways to protect and secure your business:  Employing cybersecurity analysts, auditors or specialists  Implementing a comprehensive communications archiving system  Considering cyber liability insurance    Building a culture of awareness and educating employees on common social engineering…

Read More
1 3,634 3,635 3,636 3,637 3,638 3,784