Security News

Criminals adopting new methods to bypass improved defenses, says Zscaler
2022-04-20 12:15

The number of phishing attacks worldwide jumped 29 percent last year as threat actors countered stronger enterprise defenses with newer methods, according to researchers with Zscaler's ThreatLabz research team. While the United States remained the country with the most phishing attempts, others are seeing faster growth in the number of incidents - exploiting new vectors like SMS and lowering the barrier of entry for launching attacks through pre-built tools made available on the market.

Making Defenses Count: Designing for Substantial Depth
2022-04-20 00:00

With risks accelerating in volume and variety, AMD belives that meaningful protection for today’s PCs require a carefully layered approach that relies on best-in-class security controls and...

Rethinking Cyber-Defense Strategies in the Public-Cloud Age
2022-04-19 17:29

In a September 2021 report from the nonprofit Cloud Security Alliance, nearly 70 percent of respondents - comprising 1,090 IT and security professionals - reported that their company's cloud security, IT operations and developer teams are misaligned on security policies and/or enforcement strategies. March 2021: The arts-and-crafts retailer Hobby Lobby left 138GB of sensitive customer information, source code for the company's app, and employee names and email addresses open to the public internet because of a cloud misconfiguration in its Amazon Web Services cloud database.

Moving towards defense in depth under the gray skies of conflict
2022-04-19 03:03

The war in Ukraine is in the second month of bloodshed and the broader impact of the conflict is being felt across the globe, as markets react to increased fuel prices and the consequences of Russia's growing political and economic isolation. The modus operandi of NATO leaders has been to contribute military and humanitarian aid to the Ukrainian government, while remaining below the threshold of direct engagement with Russia - a situation where the possibility of an escalation towards nuclear confrontation is evident in both the Kremlin's rhetoric and Russian doctrinal support for the use of nuclear munitions to end conventional conflict.

Cyber defense: Prioritized by real-world threat data
2022-04-12 04:30

The CIS Controls are a set of 18 prioritized actions and 153 defensive measures known as Safeguards. The CIS Community Defense Model v2.0 was created to help answer that and other questions about the value of the Controls based on threat data from leading industry reports.

When MFA fails, defense in depth is key
2022-04-07 07:45

As in the Coinbase incident, many MFA bypass attacks begin with a phishing attack. Organizations use MFA to protect users against these attacks.

Credit agency warns weak cybersecurity defenses could hurt a company’s credit rating, even before an attack
2022-04-06 17:00

Credit agency warns weak cybersecurity defenses could hurt a company's credit rating, even before an attack. As cyberattacks and data breaches grow bigger and more frequent, companies that don't build strong cybersecurity defenses may feel a direct financial hit even before hackers show up.

Advanced Threat Defense for Your Business-critical Applications on AWS
2022-04-06 00:00

Fortinet's partnership with AWS ensures your workloads and applications on AWS are protected by best-in-class security solutions. With simplified security management, full visibility across environments, and broad, comprehensive protection, gain the ultimate flexibility and control you need to build in the cloud.

5G in defense market to reach $8,952.30 million by 2027
2022-04-01 03:00

The global 5G in defense market reached a value of $765.2 million in 2021, and looking forward, the market is set to reach a value of $8,952. The widespread adoption of autonomous defense vehicles and robots in the defense sector is one of the key factors primarily driving the market growth.

Design, prioritize, and implement a cyber defense program with CIS CDM 2.0
2022-03-30 02:45

The Center for Internet Security Community Defense Model v2.0 can be used to design, prioritize, implement, and improve an enterprise's cybersecurity program. Enterprises naturally want to know how effective the CIS Critical Security Controls are against the most prevalent types of attacks.