The first step in creating a complete data security plan is to know what types of data the company collects, where it is stored, and with whom and how it is shared. Next, the business should determine the potential risks to that data and whether the information resides in electronic or physical form (or both).
If hackers can learn the ins and outs of your network, shouldn’t you beat them to the punch by obtaining deeper visibility and holistic mapping of your network infrastructure and attached applications, services, and devices?
Threat actors are actively exploiting a critical security flaw in Java logging library Apache Log4j. Log4j is an open-source, Java-based logging utility widely used by enterprise applications and cloud services, meaning many organizations are at risk from threat actors actively exploiting this vulnerability.
The Cybersecurity and Infrastructure Security Agency has released Capability Enhancement Guide (CEG): Social Media Account Protection, which details ways to protect the security of organization-run social media accounts.
To manage unprecedented demand on the network, IT teams took to overprovisioning —
adding additional capacity to the network —
as a quick fix to maintain connections between employees, stakeholders and customers.
How do cybersecurity and executive leaders communicate about ransomware? A new (ISC)² study provides insights for cybersecurity professionals into the minds of C-suite executives and how they perceive their organizations’ readiness for ransomware attacks.
2021 will be a record-breaking year for data breaches. Security magazine brings you a list of 2021’s top 10 data breaches and exposures, and a few other noteworthy mentions.