Security Strategies

AI is a Ticking Time Bomb for Your Data, Reveals New Report From Varonis
A new report from Varonis examines nearly 10 billion files and suggests that AI is a ticking time bomb for your data ...
Security Boulevard
CISA SharePoint Vulnerability Warning: RCE Flaw Exploited
Wajahat Raja | | Attack sequence, Authentication protocols, cisa, Common Vulnerability Scoring System (CVSS), CVE-2023-24955, Cyber Threats, Cybersecurity Measures, Cybersecurity News, Cybersecurity updates, federal agencies, Known Exploited Vulnerabilities (KEV), Microsoft, Network Security, patch management, Proactive defense, Remote Code Execution (RCE), Security Strategies, sharepoint, threat actors, Vulnerability warning
In light of recent cyber threats, a CISA SharePoint vulnerability warning has been issued. According to media reports, threat actors are exploiting the remote code execution flaw to launch arbitrary code, which ...

Ransomware, extortionware, and theft: Are your security strategies really working?
By Jerald Dawkins, Ph.D., Chief Technology Officer, CISO Global Published July 16, 2023 Reflecting on attacks in 2022, SonicWall’s Global Cyber Threat Report reaffirmed what many other reports have stated – that ransomware was on ...
Key Considerations for Canada’s Forthcoming National Cyber Security Strategy
On December 16, Prime Minister Justin Trudeau released mandate letters tasking his ministers of national defense, foreign affairs, public safety, and industry to develop a new “National Cyber Security Strategy.” He specifically ...
Using Strategic Choices to Ensure Continuous and Effective Cyber Security
Organizations are overwhelmed by the choice of cyber security tools in the market. They need to balance prioritizing and remediating vulnerabilities with managing their secure configurations. What’s more, many organizations are using ...
SCM: Understanding Its Place in Your Organization’s Digital Security Strategy
David Bisson | | Featured Articles, FIM, SCM, Security Configuration Management, Security Strategies
Digital attackers can compromise a system in a matter of minutes. But it generally takes organizations much longer to figure out that anything has happened. In its 2020 Data Breach Investigations Report ...
The State of Civil Aviation Cybersecurity
Anastasios Arampatzis | | aviation, cybersecurity framework, ICAO, IT Security and Data Protection, Security Strategies
Technology and cyber systems have become essential components of modern society. Despite the benefit of cyber technologies, insecurities arise. These could affect all systems and infrastructures. More than that, the threat of ...
Configuration Hardening: Proactively Guarding Systems Against Intrusion
Megan Freshley | | 20 Critical Security Controls, Application Security, attacks, Council on Cybersecurity, Data Loss Prevention, Featured Articles, Hardening Guidelines, Inventory Management, IT Security and Data Protection, Security Configuration Management, Security Strategies, system hardening, Vulnerability Management, vulnerability scanners
The concept of configuration hardening has nice imagery to it. When we use it to describe battle-hardened soldiers who have been tested in combat, a grim, determined image invariably leaps to mind ...