Products Of The Year 2024: The Finalists

Products Of The Year 2024: The Finalists

CRN staff compiled the top partner-friendly products that launched or were significantly updated over the last year. Now it’s up to solution providers to choose the winners. Application Performance and Observability As more applications run in hybrid-cloud and multi-cloud environments, maintaining application performance has becoming a more complex task. Application performance management and observability tools help IT organizations maintain the health, performance and user experience of business applications, according to market researcher Gartner. Such tools…

Read More

Best AI Security Tools: Top Solutions, Features & Comparisons

Best AI Security Tools: Top Solutions, Features & Comparisons

Generative AI features in enterprise software can be double-edged swords. AI introduces complexities and its own security issues. At the same time, it can speed up processes and enable new capabilities. The tools we’ve chosen here were often highly rated platforms before generative AI entered the scene, and we’ve rated them in part on longevity and positive reviews over time. Where AI features are major selling points for the products, we’ve examined them based on…

Read More

Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

New research by cybersecurity firm Mandiant provides eyebrow-raising statistics on the exploitation of vulnerabilities by attackers, based on an analysis of 138 different exploited vulnerabilities that were disclosed in 2023. The findings, published on Google Cloud’s blog, reveals that vendors are increasingly being targeted by attackers, who are continually reducing the average time to exploit both zero-day and N-day vulnerabilities. However, not all vulnerabilities are of equal value to attackers, as their significance depends on…

Read More

ISC2 Security Congress: The Rise in Nation-State Cyber Threats

ISC2 Security Congress: The Rise in Nation-State Cyber Threats

Today’s threat landscape includes nation-state actors as well as attackers looking to test their skills or turn a profit. AT ISC2 Security Conference in Las Vegas, CISA advisor and former New York Times cybersecurity journalist Nicole Perlroth took the stage to discuss what has changed over the last 10 years of cyber warfare. Her presentation was the capstone of the conference, held Oct. 13-16. Nation-state attackers look for ‘target-rich, cyber-poor’ victims Perlroth presented a timeline…

Read More

Number of Active Ransomware Groups Highest on Record

Number of Active Ransomware Groups Highest on Record

This year has seen the highest number of active ransomware groups on record, with 58 attacking global businesses in the second quarter. Threat intelligence platform provider Cyberint has reported only a slight dip in the third quarter, with 57 active groups. Furthermore, in Q3, the top 10 ransomware groups were responsible for only 58.3% of all detected attacks. This reflects both the increase in the number of active groups in general and a decline in…

Read More

K-12 Schools and Libraries: Key Insights on FCC’s $200M Cybersecurity Pilot and Cisco Simplified Solutions

K-12 Schools and Libraries: Key Insights on FCC’s 0M Cybersecurity Pilot and Cisco Simplified Solutions

The Cybersecurity pilot program has officially launched. Learn how Cisco has streamlined solutions designed to enhance network security. On September 17, 2024, the FCC launched its cybersecurity pilot program. Interested parties can now submit an FCC Form 484 “part one” to apply for participation through the USAC’s EPC portal. The deadline for applications is November 1, 2024. K-12 schools and public libraries that wish to apply to the pilot program can do so by submitting…

Read More

NIS 2 Compliance Deadline Approaches: What You Need To Know

NIS 2 Compliance Deadline Approaches: What You Need To Know

On Oct. 17, the Network and Information Security 2 Directive takes effect. This means that relevant entities in industries such as energy, transport, water, healthcare, and digital infrastructure that carry out activities within the E.U. must comply with the relevant legislation. NIS 2, which was approved by the European Parliament in November 2022, aims to establish a consistent, minimum cybersecurity baseline across all E.U. member states, involving mandatory security measures and reporting procedures. Organisations subject…

Read More

Zscaler Report: Mobile, IoT, and OT Cyber Threats Surge in 2024

Zscaler Report: Mobile, IoT, and OT Cyber Threats Surge in 2024

A new report from cloud security company Zscaler sheds light on the growing mobile threats on Android operating systems, as well as IoT and OT devices threats. The findings come as more than 60% of the global Internet traffic is now generated by mobile devices and financially-oriented mobile threats have grown by 111% over the last year. A list of mobile malware threats Zscaler’s ThreatLabz witnessed a 29% rise in banking mobile malware over the…

Read More

How to Present Cybersecurity in a Way That Resonates

How to Present Cybersecurity in a Way That Resonates

Securing buy-in for cybersecurity projects in business requires a fine balance. If the rest of the C-suite believes the company is already secure, the CISO may struggle to get a budget for projects. Simultaneously, getting funding for preventative measures can be difficult to communicate. At the ISC2 Security Congress held in Las Vegas from Oct. 12-16, Safe-U founder and CEO Jorge Litvin shared strategies for framing security discussions in ways that resonate with executives. Why…

Read More

99% of UK Businesses Faced Cyber Attacks in the Last Year

99% of UK Businesses Faced Cyber Attacks in the Last Year

Nearly all businesses with at least 2,000 employees were breached by cyber attackers in the last 12 months, a new report has found. The biggest risk factor, cited by 46%, was remote and hybrid workers. Dispersed workforces raise the risk of data breaches by elying on unsecured networks and personal devices, and ensuring security protocols across multiple locations while managing access presents significant challenges for IT teams. “Where policies are inconsistent, they can create gaps…

Read More
1 2 3 4 5 6 25