Younger minds — more agile and less worried by failure — provide a useful model for cyber defenders to think more creatively. Hackers are becoming increasingly bold, brazen, and cunning. To defend our connected world against the threat of increasingly mischievous, imaginative, and reckless hackers, cybersecurity experts must also learn to embrace “childish” qualities such
This gridiron-inspired advice will guarantee your digital transformation success and keep your data safe. Unlike the 16-game NFL season, for the eight in 10 companies in the US undergoing digital transformation (DX), there’s no off-season. The journey is an ongoing one that, for IT leaders, can feel like an endurance challenge, not to mention a
Their findings demonstrate how Group 4 is likely conducting server-side skimming in addition to client-side activity. Security researchers have discovered a link between Magecart Group 4 and Cobalt Group, a well-known, financially motivated group in operation since 2015. Findings indicate Group 4 is not only conducting client-side skimming but was, and likely still is, doing
Anyone can go online and download a set of generic, cookie-cutter security policies. And while the adoption of those templates might enable an auditor or a compliance officer to check the box that says the organization has a security policy in place, it doesn’t do anything to make the company any less vulnerable to attack.
Most electrical engineering firms are targeted by threat actors of opportunity because of two necessary ingredients: people and computers. These four tips will help keep you safer. Threat actors have increased their focus on supply chain attacks since 2017, with 73% of engineering firms reporting a supply chain attack in 2018. In the first quarter
Do you make decisions to ensure your organization’s environment is not only secure, but also up-to-date with the latest vulnerability patches? Moving to the cloud can help address these challenges in new, unique ways. With CIS Hardened Images® you can have peace of mind knowing your employees are working in an environment that is built
It’s Shark Week again! Are you ready to outmaneuver sharks of the cyber variety? These tips can help. Just like sharks off the Florida coast, encrypted threats are lurking in network traffic. And as the volume of transport layer security (TLS) encrypted traffic rises exponentially, organizations become even more vulnerable to attacks. Ouch! We all
The time to read the fine print in your cybersecurity insurance policy is before you sign on the dotted line.
These days, it seems that everyone has heard a cyber insurance horror story: a catastrophic cyber event followed by a swift denial of cyber insurance coverage. At a time when all companies are beginning
How to start investing in cyber security and digital emergency preparedness plans For companies, the investment in cyber security and digital emergency preparedness plans is of vastly increased importance going forward, and should at least be on par with preparation for other catastrophic events like fire and extreme weather. Cyber security strategies need to cover