A Cybersecurity Risk Assessment Guide for Leaders

A Cybersecurity Risk Assessment Guide for Leaders

Now more than ever, keeping your cyber risk in check is crucial. In the first half of 2022’s Cyber Risk Index, 85% of the survey’s 4,100 global respondents said it’s somewhat to very likely they will experience a cyber attack in the next 12 months. And 90% admitted they suffered at least one successful cyber attack in the past 12 months. Avoiding a breach is not always possible—especially since business and cybersecurity objectives are rarely…

Read More

6 Ransomware Trends & Evolutions For 2023

6 Ransomware Trends & Evolutions For 2023

More than any other industry, cybersecurity is constantly changing. But the number of major paradigm shifts that transformed the world of cybersecurity in the past few years has been unprecedented, especially when it comes to combating ransomware. The costly and global threat of ransomware has evolved alongside changing technology in the past two decades. Just as threat researchers and engineers rethink their solutions when the currents of cybersecurity shift, their adversaries are always following the…

Read More

Attack Vector vs Attack Surface: The Subtle Difference

Attack Vector vs Attack Surface: The Subtle Difference

Cybersecurity discussions about “attack vectors” and “attack surfaces” sometimes use these two terms interchangeably. However, their underlying concepts are actually different, and understanding these differences can provide a better understanding of security nuances, allowing you to improve your organization’s security by differentiating between these terms. This article guides you through the distinctions between attack vectors and attack surfaces to help you better understand the two concepts and establish a more mature security posture. Attack vector…

Read More

Dependency Mapping for DevSecOps

Dependency Mapping for DevSecOps

Dependency Mapping for DevSecOps Today, DevOps teams use a staggering array of interconnected applications and infrastructure systems to build their continuous integration and continuous deployment (CI/CD) pipelines. These components are called dependencies because they depend on each other to enhance the functionality of an application. While dependencies shorten the release cycle and simplify developers’ lives, without proper security in place, these pipelines can be exposed to critical risks. In a worst-case scenario, it can cause…

Read More

Ransomware Recovery Plan for 2023

Ransomware Recovery Plan for 2023

Ransomware continues to be a significant global threat for organizations in all sectors. In 2022, it accounted for 41% of breaches, with an average cost per breach of $4.5 million. While authorities have had some success cracking down on ransomware perpetrators, bad actors are expected to evolve their tactics and business models, generating new attack types and pursuing new targets such as the enterprise cloud. Since the ransomware risk is less a question of “if”…

Read More

TLS Connection Cryptographic Protocol Vulnerabilities

TLS Connection Cryptographic Protocol Vulnerabilities

Why Your TLS Connection May Not be as Secure as You Think The Transport Layer Security (TLS) cryptographic protocol is the backbone of encryption on the Internet. It prevents eavesdropping, tampering, and message forgery between two communicating network endpoints. TLS secures many types of Internet communication, including web browsing, email, instant messaging, and voice over IP (VoIP). However, a misconfiguration in TLS can open the doors to multiple vulnerabilities. This blog post explores the risks…

Read More

What is Business Attack Surface Management?

What is Business Attack Surface Management?

I dislike creating new terms for things in cybersecurity that already exist, so I’m on thin ice with that headline. But hear me out. Attack Surface Management (ASM) has made sense to me. “You can’t manage threats” is one of the foundations of cybersec companies and organizations have forgotten. Although we can’t manage threats, we sure can manage how we watch them, respond to them and structure our tech and security though. ASM is often…

Read More

4 Cyber Insurance Requirement Predictions for 2023

4 Cyber Insurance Requirement Predictions for 2023

Download Trend Micro’s Guide to Cyber Insurance Just a decade ago, it seemed like the only requirement from cyber insurance carriers was the need for a policy; the application process was easy, and the questionnaire was simple. But as ransomware attacks grew in popularity and damage, carriers were forced to tighten the reigns to keep a balanced book. In 2020, we witnessed the cyber insurance market harden for the first time ever. Since then, carriers…

Read More

An in-depth HTTP Strict Transport Security Tutorial

An in-depth HTTP Strict Transport Security Tutorial

HTTP Strict Transport Security (HSTS) is an Internet standard and policy that tells the browser to only interact with websites using a secure HTTPS connection. When a web browser receives an HSTS policy from a website, it automatically uses HTTPS for all future communications with that website, even if the user attempts to use HTTP. This ensures all communications between a browser and website are secure and can’t be intercepted or tampered with by an…

Read More

What is Red Teaming & How it Benefits Orgs

What is Red Teaming & How it Benefits Orgs

In today’s increasingly connected world, red teaming has become a critical tool for organizations to test their security and identify possible gaps within their defenses. Red teaming, also known as red cell, adversary simulation, or Cyber Red Team, involves simulating real-world cyber attackers’ tactics, techniques, and procedures (TTPs) to assess an organization’s security posture. In the world of cybersecurity, the term “red teaming” refers to a method of ethical hacking that is goal-oriented and driven…

Read More
1 2 3 4 5 16