83% of organizations faced at least one account takeover the past year

83% of organizations faced at least one account takeover the past year

A survey from Abnormal Security reveals that account takeovers are a prominent threat. By surveying 300 security professionals across a range of industries and organization sizes, the report found that 83% of organizations claimed to have experienced at least one account takeover in the last year. Furthermore, 45.5% of organizations experienced more than five account takeover incidents in the past year, and nearly one in five experienced more than 10. The survey determined that 77%…

Read More

Proofpoint's CISO 2024 Report: Top Challenges Include Human Error & Risk

Proofpoint's CISO 2024 Report: Top Challenges Include Human Error & Risk

In Proofpoint’s 2024 Voice of the CISO report, the cybersecurity company found that CISOs are dealing with people-centric threats more than ever. Plus, cybersecurity budgets often don’t change, and AI can help and hurt CISOs’ efforts. Regarding the specific threat risks, 41% of the CISOs mostly fear ransomware attacks, followed by malware (38%), email fraud (36%), cloud account compromise (34%), insider threat (30%) and distributed denial of service (30%) attacks. Biggest threat risks as perceived…

Read More

Top 5 Cloud Trends U.K. Businesses Should Watch in 2024

Top 5 Cloud Trends U.K. Businesses Should Watch in 2024

As business data demands increase, cloud providers and their customers find themselves having to consider the implications of increasing storage costs, security risks and environmental footprint. Such impacts are of particular importance to U.K. organisations, as it is the largest cloud market in Europe. TechRepublic spoke to U.K. cloud experts to identify the top five industry trends emerging from the country’s burgeoning reliance on the fundamental IT infrastructure. These cloud trends are: Premiumisation of cloud packages….

Read More

10 Hot AI Cybersecurity Tools At RSAC 2024

10 Hot AI Cybersecurity Tools At RSAC 2024

Vendors including Palo Alto Networks, Trellix and Proofpoint debuted new AI-powered security tools and capabilities this week during the conference. Without a doubt, this year’s RSA Conference in San Francisco has lived up to expectations when it comes to the focus on generative AI. RSAC 2024 has seen countless vendors unveil new security tools and capabilities leveraging large language model technology, and for the second year in a row, GenAI has been ubiquitous in conversations…

Read More

20 Coolest Cybersecurity Products At RSAC 2024

20 Coolest Cybersecurity Products At RSAC 2024

At RSA Conference 2024 this week, vendors are showcasing new products in categories including SASE, security operations and application security — with many touting newly released, GenAI-powered cybersecurity capabilities. Big RSAC Product Announcements Even as the cybersecurity industry continues to maintain its rapid growth pace — leading many vendors to roll out product announcements throughout the year — major makers of cybersecurity tools also continue to target the launch of new products and capabilities at…

Read More

Misconfigurations drive 80% of security exposures

Misconfigurations drive 80% of security exposures

A report from XM Cyber analyzes more than 40 million exposures in order to provide a thorough understanding of the current exposure landscape. The report found that 80% of exposures are caused by identity and credential misconfigurations. Out of these exposures, one-third of them put critical assets at risk of a breach. According to the report, a majority of the exposure is within an organization’s active directory, a critical component for connecting users to network…

Read More

Cisco and Nvidia: Redefining Workload Security

Cisco and Nvidia: Redefining Workload Security

There has been an exponential increase in breaches within enterprises despite the carefully constructed and controlled perimeters that exist around applications and data. Once an attacker can access the network, it becomes an “all you can eat” buffet as they move laterally around the environment, taking control, and either exfiltrating sensitive data, or locking it up with ransomware. Enterprises traditionally use two approaches to mitigate these risks: implementing intrusion detection solutions and defining micro-perimeters around…

Read More

Top 40 Cybersecurity Companies You Need to Know 2024

Top 40 Cybersecurity Companies You Need to Know 2024

eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. As the demand for robust security defense grows, the market for cybersecurity technology has exploded, as have the number of available solutions. To help you navigate this growing market, we recommend 20 of the world’s leading cybersecurity technology providers and another 20 honorable mentions, based on their innovation, revenue and growth, user…

Read More

Sign up for a Tour at the RSA Conference 2024 SOC

Sign up for a Tour at the RSA Conference 2024 SOC

Join the guided tour outside the Security Operations Center, where we’ll discuss real time network traffic of the RSA Conference, as seen in the NetWitness platform. Engineers will be using Cisco Security Cloud in the SOC, comprised of Cisco Breach Protection Suite, User Protection Suite, Cloud Protection Suite and Secure Firewall. Incidents are investigated with Threat Intelligence, provided by Cisco Talos, partners Recorded Future, alphaMountain, Pulsedive and community sources. Outside the SOC, you will receive…

Read More

UK's NCSC Issues Warning as SVR Hackers Target Cloud Services

UK's NCSC Issues Warning as SVR Hackers Target Cloud Services

Russian state hackers are adapting their techniques to target organizations moving to the cloud, an advisory from the UK National Cyber Security Centre and international security agencies has warned. The advisory details how cyber espionage group APT29 is directly targeting weaknesses in cloud services used by victim organizations to gain initial access to their systems. APT29 is also expanding the scope of its attacks beyond governments, think tanks, healthcare and energy providers to include victims…

Read More
1 2 3 4 14