May 2021 saw a 440% increase in phishing, the single largest phishing spike on record

May 2021 saw a 440% increase in phishing, the single largest phishing spike on record

Around half of businesses (45.49%) and consumers (52.35%) on average saw at least one sustained additional infection in May 2021, according to the latest metrics from Webroot Brightcloud Mid Year Threat Report. In May 2021, the report revealed a 440% increase in phishing, holding the record for the single largest phishing spike in a single month. It also showed that industries such as oil, gas and mining saw a 47% increase in the same six-month…

Read More

How Tripwire State Analyzer Can Help You to Comply with NERC CIP

How Tripwire State Analyzer Can Help You to Comply with NERC CIP

Are you an organization that operates a Bulk Power System (BPS) in the United States? If so, you understand the need to comply with the Critical Infrastructure Protection (CIP) standards. Developed by the North American Electric Reliability Corporation (NERC), CIP is a set of requirements through which in-scope entities can protect themselves against digital attacks, thereby strengthening the reliability of the U.S. electric grid overall. The issue is that it is becoming more and more…

Read More

House of Commons (HoC) Beefs up Cyber Training Following Matt Hancock CCTV Leak Scandal

House of Commons (HoC) Beefs up Cyber Training Following Matt Hancock CCTV Leak Scandal

The UK House of Commons (HoC), the house of the UK Parliament, has pushed through over 2,600 out of 3,000 members of staff through cyber training following the Whitehall CCTV security leaks from the Matt Hancock scandal. According to official figures obtained by Parliament Street think tank attained via Freedom of Information (FOI) requests, 2,658 HoC staff members were put through an eight-part cybersecurity training course during the 2020/21 financial year. The course, ‘Annual Essentials…

Read More

NCSC Sticks by ‘Three Random Words’ Strategy for Passwords

NCSC Sticks by ‘Three Random Words’ Strategy for Passwords

Combining three random words is more effective than using complex combinations for passwords, says the National Cyber Security Council (NCSC).  An NCSC blog post dated August 9 explains how this train of thought or “think random” helps to “keep the bad guys out.” The post follows on from a previous one from nearly five years ago, “Three random words or #thinkrandom.” According to the post, enforcing “complex requirements” for passwords is a poor defense against guessing attacks….

Read More

Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?

Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?

By eSentire The influx of cyber attacks within the past few years have painted a dire image for the C-suite and the boardroom. As cyber risks grow in number and complexity, business leaders are left wondering just how effective their security programs are. After all, we’ve heard it many times before: cybersecurity is not an IT problem, it’s a business risk to manage. There are many approaches to developing and managing a cybersecurity program. Currently,…

Read More

CISO job satisfaction: Finding meaning in the mission

CISO job satisfaction: Finding meaning in the mission

Lena Smart makes the perfect pitch for being a CISO. She talks up the multitude of good opportunities in the field and points to the plethora of interesting challenges that come with the role. She speaks about the strong relationships she has forged as a CISO, and she readily discusses the high levels of trust that exist between her, her team, and the other executives. She also likes that she can set a security strategy…

Read More

New risks, new regulations: Best practices for travel security in 2021

New risks, new regulations: Best practices for travel security in 2021

New risks, new regulations: Best practices for travel security in 2021 | 2021-08-09 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

The dangers within: What’s hiding in your network?

The dangers within: What’s hiding in your network?

The dangers within: What’s hiding in your network? | 2021-08-09 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Firewalls, you’re fired

Firewalls, you’re fired

Firewalls, you’re fired | 2021-08-09 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Three elements of a successful GSOC

Three elements of a successful GSOC

Three elements of a successful GSOC | 2021-08-09 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2,158 2,159 2,160 2,161 2,162 2,592