New business initiatives and processes have created broader attack surfaces. Applications, users, and devices are moving outside of the traditional corporate zone of control, dissolving what was once the trusted perimeter, and enterprise security and networks must evolve to protect the business.
A staggering 97% of IT leaders say insider breach risk is a significant concern, according to a survey by Egress.78% think employees have put data at risk accidentally in the past 12 months and 75% think employees have put data at risk intentionally. When asked about the implications of these[...]
Cloud-enabled cyberattacks are ramping up, as indicated in a new Netskope study that found 44% of security threats use cloud services in various stages of the kill chain. Attackers are targeting popular cloud apps and services to exploit the growing trust in commonly used enterprise platforms.[...]
A new report shows the scale of ransomware's harm and the growth of that damage year-over-year -- an average of $141,000 per incident.No one questions that a ransomware attack is a bad thing. But a new report doesn't just confirm that these encryption assaults are bad, it also quantifies the[...]
44% of malicious threats are cloud enabled, meaning that cybercriminals see the cloud as an effective method for subverting detection, according to Netskope.89% of enterprise users are in the cloud, actively using at least one cloud app every day. Cloud storage, collaboration, and webmail apps[...]
Business email compromise (BEC) attacks cost organizations an estimated $1.77 billion in losses in 2019, reports the FBI, which received a total of 23,775 complaints related to this threat.The FBI's Internet Crime Complaint Center (IC3) this week released its "2019 Internet Crime Report," which[...]
Oracle’s cloudy partnership with Microsoft, announced in June, was one of the more eyebrow-raising stories of 2019. On the surface, it may have seemed peculiar, but digging down, the duo’s focus on retail customers – particularly with some retailers wishing to steer clear of AWS – made sense.[...]
Multivector and cloud computing attacks have been rising over the last twelve months, according to Link11. The share of multivector attacks – which target and misuse several protocols – grew significantly from 46% in the first quarter to 65% in the fourth quarter.DNS amplification was the most[...]
Armis, the leading enterprise IoT security company, announced the discovery of five zero-day vulnerabilities in various implementations of the Cisco Discovery Protocol (CDP).
The implementation of massive MIMO in 5G systems is changing, according to a Mobile Experts report.There’s a shift away from the dominant position of 64T64R mMIMO, toward 32T32R systems. During initial 5G system roll-outs, the distinct preference was to achieve best coverage and data rate,[...]
Our unique positioning on the global market enables us to be at the forefront of every new technology and with that unique expertise we help our clients to quickly and cost effectively choose, test and deploy the best solutions to service their customer base.