It can’t have escaped everyone's attention, since the move to the cloud the number of data breaches has gone through the roof. In this article, I’m going to run through why this is happening, why workplace policy won’t fix it, and what your organization can do to reduce the risk of being next.
There was a 37 percent increase worldwide in enterprise mobile phishing encounter rate between the fourth quarter of 2019 and the first quarter of 2020, according to Lookout.The report also shows that unmitigated mobile phishing threats could cost organizations with 10,000 mobile devices as much[...]
Not even the red-hot cybersecurity sector is immune to the major economic downturn resulting from the global coronavirus pandemic. As parts of the world begin to gradually reopen for business as stay-at-home orders lift, many IT security teams now also face a fresh new reality of spending and[...]
Currently, organizations are struggling to adjust to the new normal amidst the COVID-19 pandemic, a Bitglass survey reveals. 41% have not taken any steps to expand secure access for the remote workforce, and 50% are citing proper equipment as the biggest impediment to doing so. Consequently, 65%[...]
Earlier this month, when F-Secure publicly revealed the existence of two vulnerabilities affecting SaltStack Salt and attackers started actively exploiting them, Cisco was among the victims.The revelation was made on Thursday, when Cisco published an advisory saying that, on May 7, 2020, they’ve[...]
The WAN optimization market is expected to grow from $1,047.1 million in 2020 to $1,446.2 million by 2025, at a Compound Annual Growth Rate (CAGR) of 6.7% during the forecast period of 2020-2025, according to ResearchAndMarkets.Most cloud-based applications need good bandwidth and low latency[...]
Once considered a loader for other malware, Valak regularly conducts reconnaissance and steals information and credentials, new analysis shows.Over the past six months, a surge of development activity on a malicious program known as Valak — traditionally used for loading other malware on[...]
The number of workforce identities in the enterprise is growing dramatically, largely driven by DevOps, automation, and an increase in enterprise connected devices, which will only continue to accelerate identity growth, an IDSA survey of 502 IT security and identity decision makers reveals.At[...]
Threat actors are pivoting away from noisy website attacks to campaigns that are quieter and designed to remain undetected for as long as possible.From website defacements and SEO spam, attackers are increasingly targeting websites to install backdoors and other stealthy malware, according to a[...]
Our unique positioning on the global market enables us to be at the forefront of every new technology and with that unique expertise we help our clients to quickly and cost effectively choose, test and deploy the best solutions to service their customer base.