Warnings show use of artificial intelligence tech to impersonate senior enterprise executives Earlier this week, the Israel National Cyber Directorate (INCD) issued a warning of a new type of cyber-attack that leverages artificial intelligence technology to impersonate senior enterprise executives. The method instructs company employees to perform transactions including money transfers and other malicious activity
The time to read the fine print in your cybersecurity insurance policy is before you sign on the dotted line.
These days, it seems that everyone has heard a cyber insurance horror story: a catastrophic cyber event followed by a swift denial of cyber insurance coverage. At a time when all companies are beginning
Changes in fundamental enterprise architectures coupled with shifts in human resources mean that companies are considering new risks to their infrastructure. Data centers face a huge increase in compute demand while looking at a precipitous drop in trained IT personnel. Add to those factors executive demand for changes in how data centers are powered, and
Despite increasing threats, many organizations continue to run with only token cybersecurity and resilience. According to Ernst & Young’s Global Information Security Survey 2018-19, over half of organizations fail to make organizational protection a key part of their strategic plans. After soliciting the opinions of approximately 1,400 C-suite leaders, EY concludes that larger firms are
There are many theories around the talent gap in cyber security – some say there is a talent shortage, some say there is a skills gap, and others believe recruiters and/or those hiring don’t know what they’re looking for — among a plethora of other opinions. Regardless, it was a critical topic of discussion in
Enterprise networks are amazingly complex these days, to the point where one misconfiguration can potentially expose an entire organization to dangerous vulnerabilities and attacks. To find those problems before a hacker could uncover them, cybersecurity teams traditionally conduct so-called red team exercises where trained attackers would try to compromise a network and then report their
After establishing a risk assessment and risk management as the foundation for a cyber security program, many enterprises then turn to a control framework or set of standards to help streamline processes and reduce costs. Standards can help the organization define terminology, and manage systems, processes and controls in a more streamlined or uniform manner.
Half of survey respondents cite phishing scams or data exposure as most significant In a recent audience survey, Cyber Security Hub realized that media coverage has a lot to do with what drives more awareness of where cyber security professionals should be focusing. In an open-ended survey question, we asked respondents to identify what they
Survey findings show where cyber security professionals are focused mid-year and where they’re headed In May 2019, Cyber Security Hub surveyed executives to see if their challenges and focuses have changed half way through the year. With the ability to benchmark these results to a previous survey (November 2018), we can see where priorities started
Register In June, we set out to explore how 2019 is going with a mid-year survey. We wondered are the issues, problems and concerns first identified in our November 2018 report still true? Have priorities changed? Has focus shifted? We have compiled the results that reveal a snapshot of the challenges, focuses, and spend in