Two-Thirds of Large Firms Attacked as COVID-19 Hampers Security

Two-Thirds of Large Firms Attacked as COVID-19 Hampers Security

Nearly two-thirds of medium and large-sized businesses suffered a cyber-attack or breach last year, with security efforts suffering during the pandemic, according to the latest government figures. The Cyber Security Breaches Survey 2021 on the face of it showed a slight improvement over last year’s: 39% of UK businesses of all sizes said they were breached or attacked over the previous 12 months versus 46% last year. However, while the report posits that this could…

Read More

Half of UK Firms Suffer Cyber-Skills Gaps

Half of UK Firms Suffer Cyber-Skills Gaps

Half of UK businesses reported cyber-skills gaps last year, with diversity still woefully lacking in most organizations, according to the latest government figures. The DCMS-sponsored Cybersecurity skills in the UK labour market 2021 report was compiled from representative surveys of security sector and wider organizations, as well as analysis of job postings and research with recruitment agencies. It revealed that around 680,000 businesses in the country have staff in charge of cybersecurity that lack the…

Read More

#IMOS21: Six Components of a Bug Bounty Program

#IMOS21: Six Components of a Bug Bounty Program

Speaking at the Spring Infosecurity Magazine Online Summit, Sean Poris, director, product security at Verizon Media, explored how to run a bug bounty program, outlining the six components of a successful big bounty structure. Poris explained that, by investing in bug bounties, organizations are potentially tapping into “hundreds of thousands of global hackers” that think about software and vulnerabilities in ways that internal staff might not. He also said that knowing and understanding your objectives…

Read More

FatFace Faces Customer Anger After Ill-Judged Breach Response

FatFace Faces Customer Anger After Ill-Judged Breach Response

British clothing retailer FatFace is facing a mounting storm of criticism for its handling of a “sophisticated criminal attack” which led to the compromise of customers’ personal data (PII). In an email to customers posted by HaveIGotPwned? founder Troy Hunt this week, the firm revealed that the breached data included customers’ full names, email and home addresses and partial card details (last four digits and CVV). “On January 17, 2021 FatFace identified some suspicious activity within…

Read More

CISA and NCSA Advise K-12 on Future Cybersecurity Threats

CISA and NCSA Advise K-12 on Future Cybersecurity Threats

As if they didn’t have enough on their plate with remote learning and COVID-19 safety, K-12 schools experienced a rash of ransomware attacks in 2020 that’s expected to continue through the school year and into the future. To help educators navigate the problem, the federal Cybersecurity and Infrastructure Security Agency (CISA) and nonprofit National Cyber Security Alliance (NCSA) hosted a webinar on Wednesday in which cybersecurity experts urged constant vigilance, regular training and sharing resources….

Read More

Are disrupted employees a new cybersecurity threat?

Are disrupted employees a new cybersecurity threat?

Are “disrupted” employees a new cybersecurity threat? | 2021-03-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Cybersecurity overspending: It’s time to shed the belt or the suspenders

Cybersecurity overspending: It’s time to shed the belt or the suspenders

Cybersecurity overspending: It’s time to shed the belt or the suspenders | 2021-03-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

A new resolution: Course-correct any rushed pandemic-driven decisions

A new resolution: Course-correct any rushed pandemic-driven decisions

A new resolution: Course-correct any rushed pandemic-driven decisions | 2021-03-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

How Tripwire Does Configuration Management Differently

How Tripwire Does Configuration Management Differently

So many times, we hear companies say, “Our tools are just like Tripwire’s,” “We do configuration management just like Tripwire” and “We can push out policy just like Tripwire.” But as we say, this just ain’t necessarily so. You might be able to do configuration management using a “Tripwire-like” tool. You might configure it and use it set up a policy or a configuration of a system. This configuration needs to stay the way it…

Read More

How to Stay Connected and Protected in a Remote Work Environment | McAfee Blogs Remote Work Tips: How to Stay Connected and Protected | McAfee Blog

How to Stay Connected and Protected in a Remote Work Environment | McAfee Blogs Remote Work Tips: How to Stay Connected and Protected | McAfee Blog

How to Stay Connected and Protected in a Remote Work Environment   Advancements in cloud solutions and collaboration tools in recent years, coupled with the necessity of going remote due to the pandemic, have empowered today’s workforce to choose where they want to work. While the ability to work from anywhere—home, the library, coffee shops or even the beach– gives employees increased flexibility, the shift from the traditional office setting has exposed security and logistical concerns….

Read More
1 2,502 2,503 2,504 2,505 2,506 2,721