Security News > 2021 > June

Enabling enterprises to go above and beyond typical security functionality, extended detection and response provides a much simpler, single pane of glass view that seamlessly integrates multiple security products into one system. To accommodate the variety, volume, and velocity of security-focused data that 5G networks are creating, XDR technologies must be anchored by a modern data pipeline with the ability to collect and process security data at scale across hybrid IT environments.

Organizations need to rethink their approach to threat modeling or risk losing its value as a key defense in their cybersecurity arsenals. The traditional approaches to threat modeling can be very effective, but they don't scale well enough in the current computing and threat landscape.

As demands on the compliance function grow more intense, Chief Compliance Officers must proactively embrace new leadership responsibilities for their role and reposition how their function is thought of among stakeholders, according to Gartner. These working models require CCOs to embrace new roles, and in some cases, assertively expand how their function is thought of by stakeholders and business leaders, including acting as a strategic business advisor and championing the use of analytics to better manage new layers of risk.

According to the 200 CISOs and other security decision makers who participated in the survey, nearly 60% consider lack of visibility as well as inadequate identity and access management a major threat to their cloud infrastructure. 85% of organizations said they plan to increase their security spending this year, with a significant portion being allocated to cloud infrastructure security.

NAVEX Global released key findings from its survey of IT security professionals in the U.S. and U.K. on the collaboration between the IT and risk management functions. 91% say cybersecurity is considered a top business risk within their organization.

Cybersecurity remains a top priority for SMBs worldwide, as revealed in a survey conducted by Vanson Bourne. The report found that organizations are challenged to find a MSP or a TSP that will help protect them from rising cybersecurity threats, and most would consider moving to a new IT service provider with the "Right" solution, and would pay on average 34% more for that service provider.

SonicWall announced three new high-performance firewall models for enterprises and large organizations - NSa 4700, NSa 6700 and NSsp 13700 - designed to accelerate network throughput, stop advanced cyberattacks like ransomware, and securely connect millions of users. The new SonicWall NSa 4700 and NSa 6700 next-generation firewalls deliver 18 and 36 Gbps of firewall throughput - three times the previous comparable SonicWall appliances.

Abandoned or ignored subdomains often include overlooked vulnerabilities that leave organisations open to attack, according to a team of infosec researchers from the Vienna University of Technology and the Ca' Foscari University of Venice. That laxity leaves subdomains open to a cookie-based attack in which an attacker sets up their own site to replace an abandoned or expired subdomain hosted on a completely different server from the main web site.

D-Link has introduced their latest Cloud-enabled SD-WAN Gateway and mobile apps to their Nuclias Cloud network management solution at Mobile World Congress in Barcelona, Spain. D-Link's Nuclias Cloud Networking Solution helps businesses resolve these issues and build the infrastructure needed to support a largely remote workforce while reducing cost, maximizing resources, and alleviating daily network management challenges.

DeltaNet International announced the availability of its Phishing Simulator, to help organizations strengthen their cybersecurity awareness training against phishing attacks. The phishing simulation tool can be used simply to test the susceptibility of an organization from falling victim to a phishing attack, but when combined with follow-up training to close knowledge and risk gaps, users can experience true added value.