Compliance Costs Are Eating Security Budgets

|
The cost of cybersecurity compliance is rising to unsupportable levels and enterprises are going to need to act soon if they are to keep the situation from hindering innovation, according to a new report. Conducted jointly by analyst firm Omdia and security advisory consultancy Coalfire, the study shows that over ... Read More

7 Hot Takes on Cyber Incident Response Planning

|
When you fail to plan, you plan to fail. And according to a plurality of veteran security experts, far too many organizations today plan to fail at cyber incident response ... Read More

DDoS Attack Stats Accelerate in Quarantine Era

|
Even as internet and cloud solution providers are scrambling to reliably handle increased traffic due to the sudden shifts to distributed workforces in the face of COVID-19, they're also battling strains against their bandwidth from a decidedly less legitimate front. According to several pieces of research out recently, DDoS attackers ... Read More

Ransomware Crooks Emboldened by More Payments, Experiments in ‘Customer’ Experience

|
A new report out from CyberEdge Group showed that ransomware attacks broke the record books again last year as criminals were carried to more profitable highs by two new prevailing trends. The first trend is that ransom payers are more successfully recovering their data, which leads to the second trend, ... Read More

7 Cyberattacks Against Pandemic-Stressed Healthcare Orgs

|
It's only been a couple weeks since our team at Business Insights predicted that healthcare organizations would still be targeted by cybercriminals amid the COVID-19 outbreak. The prognostications are proving sadly accurate. Pandemic or no, healthcare cyberattacks keep coming—in spite of some cybercriminals' promises to the contrary ... Read More

The Protocol That’s Putting Enterprise IoT At Extreme Risk

|
A protocol little known by executives outside of the networking world may put the future safety of enterprise IoT at extreme risk if organizations don't take action to secure their connections. New research out last week found that the way that many large organizations are using the Long Range Wide ... Read More

Securing AI: The Next Gen of Enterprise Cybersecurity

|
Recently, a facial recognition vendor that consolidates billions of photos to fuel its artificial intelligence (AI) people-searching platform admitted to a major breach. On its surface, the incident is a pretty standard exposure of client list details. But scratch a little deeper and the problems inherent with the breach highlight ... Read More

The ‘Grass-is-Greener’ Syndrome of Modern SOCs

|
While most enterprises recognize the critical role that security operation centers (SOC) play in cybersecurity activities, very few are able to perfect a SOC approach that meets their ultimate satisfaction. A new study out on attitudes toward SOC efficacy shows that organizations are spending millions each year to run their ... Read More

The Protocol That’s Putting Enterprise IoT At Extreme Risk

|
A protocol little known by executives outside of the networking world may put the future safety of enterprise IoT at extreme risk if organizations don't take action to secure their connections. New research out last week found that the way that many large organizations are using the Long Range Wide ... Read More

API Security a Top Concern for Cybersecurity in 2020

|
The role of the application programmable interface (API) keeps rising in prominence within the enterprise. And as that happens, so does the risk of APIs as an enterprise attack surface. According to security experts, API security will be a top concern for many cybersecurity organizations in the coming year ... Read More