Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

CISOs know best practice information security management comes down to people as much as technology. Without employees and a robust security culture on your side, tech deployment will not stop threat actors, who continue to find their way into organisations. It appears Asia-Pacific employees are not getting the message. Cyber security company Proofpoint recently surveyed 7,500 employees and 1,050 security professionals in 15 countries, including Australia, Japan, South Korea and Singapore. The company found that…

Read More

Top 40 Cybersecurity Companies You Need to Know 2024

Top 40 Cybersecurity Companies You Need to Know 2024

eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. As the demand for robust security defense grows, the market for cybersecurity technology has exploded, as have the number of available solutions. To help you navigate this growing market, we recommend 20 of the world’s leading cybersecurity technology providers and another 20 honorable mentions, based on their innovation, revenue and growth, user…

Read More

Sophos: Cyber Security Professional Burnout Is Widespread, Creating Risk for APAC Organisations

Sophos: Cyber Security Professional Burnout Is Widespread, Creating Risk for APAC Organisations

Many cybersecurity professionals with burnout in APAC have suffered in silence for years. However, a growing body of regional research, including a recent report from cybersecurity firm Sophos, is bringing attention to the extent, causes and impacts of the problem. The Sophos report, The Future of Cybersecurity in Asia-Pacific and Japan, found burnout and fatigue are widespread, with nine out of 10 employees impacted on some level. Causes include a lack of resources and alert…

Read More

Microsoft’s Security Copilot Enters General Availability

Microsoft’s Security Copilot Enters General Availability

Microsoft Security Copilot, also referred to as Copilot for Security, will be in general availability starting April 1, the company announced today. Microsoft revealed that pricing for Security Copilot will start at $4/hr, calculated based on usage. At a press briefing on March 7 at the Microsoft Experience Center in New York (Figure A), we saw how Microsoft positions Security Copilot as a way for security personnel to get real-time assistance with their work and…

Read More

White House Recommends Memory-Safe Programming Languages and Security-by-Design

White House Recommends Memory-Safe Programming Languages and Security-by-Design

A new White House report focuses on securing computing at the root of cyber attacks — in this case, reducing the attack surface with memory-safe programming languages like Python, Java and C# and promoting the creation of standardized measurements for software security. The report urges tech professionals to: Implement memory-safe programming languages. Develop and support new metrics for measuring hardware security. This report, titled Back to the Building Blocks: A Path Toward Secure and Measurable…

Read More

Protect Your Business With This $40 Cybersecurity E-Learning Bundle

Protect Your Business With This  Cybersecurity E-Learning Bundle

TL;DR: Stay up-to-date with the latest in cybersecurity with this seven-course e-learning bundle at $39.99 — that’s just $6 per course. In today’s rapidly evolving digital landscape, businesses and individuals face unprecedented cybersecurity challenges, making it crucial for professionals like yourself to stay ahead of the curve. Whether you’re hoping to start a career in this field or find ways to safeguard your personal or business information, you might want to take advantage of this…

Read More

NIST Cybersecurity Framework: A Cheat Sheet for Professionals

NIST Cybersecurity Framework: A Cheat Sheet for Professionals

The National Institute of Standards and Technology has updated its Cybersecurity Framework for 2024. Version 2.0 of the NIST CSF, the first major update since the framework was released a decade ago, was created with the goal of expanding the primary audience from critical infrastructure to all organizations. In general, the NIST CSF aims to standardize practices to ensure uniform protection of all U.S. cyber assets. TechRepublic’s cheat sheet about the NIST CSF is an…

Read More

UK's NCSC Issues Warning as SVR Hackers Target Cloud Services

UK's NCSC Issues Warning as SVR Hackers Target Cloud Services

Russian state hackers are adapting their techniques to target organizations moving to the cloud, an advisory from the UK National Cyber Security Centre and international security agencies has warned. The advisory details how cyber espionage group APT29 is directly targeting weaknesses in cloud services used by victim organizations to gain initial access to their systems. APT29 is also expanding the scope of its attacks beyond governments, think tanks, healthcare and energy providers to include victims…

Read More

New Vulnerabilities in ConnectWise ScreenConnect Massively Exploited by Attackers

New Vulnerabilities in ConnectWise ScreenConnect Massively Exploited by Attackers

Two new vulnerabilities impact ConnectWise ScreenConnect, remote desktop and access software used for support: CVE-2024-1709 and CVE-2024-1708, with the former being particularly dangerous for organizations. The CVE-2024-1709 vulnerability, which affects ScreenConnect 23.9.7 and prior, allows any remote attacker to bypass authentication to delete the ScreenConnect user database and get control of an admin user. Massive exploitation by attackers is ongoing in the wild, with more than 3,000 vulnerable instances reachable from the internet. Security companies…

Read More

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

Highlights from CrowdStrike’s 2024 report: Identity-based and social engineering attacks still take center stage. Cloud-environment intrusions have increased by 75% from 2022 to 2023. Third-party relationships exploitation makes it easier for attackers to hit hundreds of targets. CrowdStrike added 34 new threat actors in 2023. Attackers are compromising networks at a faster rate. Attackers are targeting periphery networks. CrowdStrike’s new 2024 Global Threat report exposed the latest trends in cyberattacks, and we’re highlighting the main…

Read More
1 14 15 16 17 18 27