Tag "Cyber Risk"

Back to homepage
Software

3 advanced prevention technologies expected to grow in 2018

New technologies will help organizations decrease the attack surface and simplify security operations.Last week, I described how 2018 will be the year of advanced prevention. Now, we’ve had technologies for

Hardware/Network

Millions stolen in Bitcoin hack on mining service

News has broke that “highly professional” hackers have stolen around 4,700 Bitcoin from a leading mining service, NiceHash.’Attackers can make a lot of money when attacking crypto exchanges due to

Industry Insights

Global security spending to reach $96 billion in 2018

Gartner forecasts worldwide enterprise security spending to total $96.3 billion in 2018, an increase of 8 percent from 2017. Organizations are spending more on security as a result of regulations,

Hardware/Network

Internet Of Things: 5 Ways To Overcome Security Challenges

The promise, benefits, and value of the Internet of Things (IoT) have been documented extensively, but a number of widely publicized IoT attacks leaves the impression that IoT is deeply

Vendor News

IRONSCALES Secures $6.5 Million to Automate Email Phishing

IRONSCALES, the world’s first automated phishing prevention, detection and response provider, today announced that it has secured a $6.5 million Series A, led by K1 Investment Management, LLC, with participation

Industry Insights

Emerging Trends in Vulnerability Management

The increasing adoption of undefended new technologies like Internet of Things (IoT) and escalation in cybercrime activity have given rise to more damaging breaches. The ensuing regulatory and legal scrutiny

Industry Insights

Insider threats and the misuse of privileged credentials

35% of IT professionals see themselves as the biggest internal security risk to networks within their organisation, according to new research from Balabit.IT professionals may understand what their most valuable

Hardware/Network

To protect your network, you must first know your network

A sobering statistic regarding commonly used security controls was highlighted in a recent report. “Software and hardware inventory and valuation” was the least cited control, with only 16% of CISOs leveraging

Industry Insights

Traveling This Holiday Season? Beware of RFID Attacks

Everywhere around us, it seems like the traditional lock and key have been traded in for a plastic card or key fob device. These alternative devices use radio frequency identification

Industry Insights

10 tips to optimize security during the holidays

Optiv Security shared its annual list of tips to help organizations get the most from their security programs during the busy holiday season. A team of security experts developed 10