Women in Cybersecurity: ISC2 Survey Shows Pay Gap and Benefits of Inclusive Teams

Women in Cybersecurity: ISC2 Survey Shows Pay Gap and Benefits of Inclusive Teams

Only 17% of respondents to the ISC2 Cybersecurity Workforce Study were women, showing a continued struggle for workplaces to recruit and retain women in this industry. This year’s report shows positive trends as well, with younger women finding paths into cybersecurity careers. ISC2 provided a detailed look at the state of women in the workforce, as well as tips for how to attract and retain diverse talent. ISC2 surveyed 14,865 cybersecurity practitioners in North America,…

Read More

Apple Alerts iPhone Users to Mercenary Spyware Attacks

Apple Alerts iPhone Users to Mercenary Spyware Attacks

Apple sent a threat notification to iPhone users in 92 countries on April 10 informing them that their device was “being targeted by a mercenary spyware attack.” The alert, sent at 12:00 p.m. Pacific Time, told recipients that the attackers were attempting to “remotely compromise” their phone and that they were likely being targeted specifically “because of who you are or what you do.” Apple’s notification did not identify the alleged attackers, nor did it…

Read More

Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted

Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted

Organisations that have backed up their sensitive data may believe they are relatively safe from ransomware attacks; however, this is not the case based on findings from a new study from IT security company Sophos. The report showed that cybercriminals attempted to compromise the backups of 94% of companies hit by ransomware in the past year. Attackers are aware that those who fall victim to ransomware must choose to either pay the ransom or recover…

Read More

XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor

XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor

A threat actor quietly spent the last two years integrating themself in the core team of maintainers of XZ Utils, a free software command-line data compressor widely used in Linux systems. The attacker slowly managed to integrate a backdoor in the software that was designed to interfere with SSHD and allow remote code execution via an SSH login certificate. The backdoor was discovered a few days before being released on several Linux systems worldwide. The…

Read More

How to Steer Clear of Tax Season Scams

How to Steer Clear of Tax Season Scams

It’s that time of year again – tax season! Whether you’ve already filed in the hopes of an early refund or have yet to start the process, one thing is for sure: cybercriminals will certainly use tax season as a means to get victims to give up their personal and financial information. This time of year is advantageous for malicious actors since the IRS and tax preparers are some of the few people who actually…

Read More

Tech Needed to Survive This Decade's 'Seismic' APAC B2B Trends

Tech Needed to Survive This Decade's 'Seismic' APAC B2B Trends

The business-to-business market will see a number of big changes in the years to 2030, according to a new report from customer experience firm Merkle. APAC regional B2B enterprises will need to consider their levels of investment in a number of technologies and integrating new tools now to prepare for and adapt to the coming changes. The B2B Futures: The View From 2030 report argues four key “seismic” trends are coming to B2B: A rise…

Read More

Unlocking the Future of Government Cybersecurity: Insights from CyberScoop's Zero Trust Summit

Unlocking the Future of Government Cybersecurity: Insights from CyberScoop's Zero Trust Summit

Navigating Zero Trust with Advanced Visibility and AI-Powered Cyber Defense Visibility is essential and foundational to effectively addressing governmental zero trust mandates and guidance. Observability must extend to users, devices, identity, infrastructure, workflows, applications, workloads, and data. Although vital, visibility alone is insufficient to realize effective cybersecurity. Government organizations must also be able to apply analytics to understand anomalous activity and then drive automation and orchestration to dynamically respond to and reconfigure infrastructure to prevent…

Read More

3 UK Cyber Security Trends to Watch in 2024

3 UK Cyber Security Trends to Watch in 2024

Staying up to date with the latest in cyber security has arguably never been more paramount than in 2024. Financial services provider Allianz named cyber attacks this year’s biggest risk for business in the U.K. and a top concern for businesses of all sizes for the first time. However, many professionals are still in the dark about what the events in Q1 tell us about the cyber landscape for the rest of the year that…

Read More

Cisco Secure Application makes it easier than ever to secure your cloud native applications and sensitive data

Cisco Secure Application makes it easier than ever to secure your cloud native applications and sensitive data

With Cisco Secure Application on the Cisco Observability Platform, customers have more flexibility and choice when it comes to tackling their most difficult security challenges. Managing an organization’s security posture is extraordinarily complex — new bad actors, exploits and threats are constantly bubbling up. Meanwhile, organizations have a deep responsibility for their customer and user data safety, as well as legal obligations for data handling from regulations like GDPR (General Data Protection Regulation), HIPAA (Health…

Read More

Watch Out For IRS Scams and Avoid Identity Theft | McAfee

Watch Out For IRS Scams and Avoid Identity Theft | McAfee

It’s time to get those W-2 and 1099 tax forms ready. On January 29th, the IRS began accepting paper and electronic tax returns ahead of the April 15th due date. But as users prepare to file, scammers prepare to take advantage of innocent taxpayers with malicious tactics, looking to harvest the extensive amounts of personal data found in IRS tax documents. Let’s take a look at common tactics hackers may leverage this tax season. Impersonation…

Read More
1 11 12 13 14 15 25