Threat actors are like the weather: regardless of your desires, they will continue, and that is completely outside of anyone’s control. In response to this, we have to be as proactive as we possibly can. Here are the cybersecurity trends we will see heading into 2022.
Small and medium-sized businesses (SMBs) face different challenges than large enterprise organizations when it comes to cybersecurity. From talent and security budgets to the evolving threat landscape, explore how best to solve issues faced by SMB enterprise security leaders.
As organizations shift to permanent hybrid work environments, security leaders must weigh the benefits and challenges of a Bring Your Own Device (BYOD) model.
Employees and non-employee contractors continue representing the most critical weak link in the IT chain. Too many employees, and vendors using corporate networks, are still falling for phishing attacks. Enhanced worker training on cyber risks helps, but training coupled with stronger systems offers the best protection against cyber threats.
The second Voice of SecOps report from Deep Instinct revealed that the average time elapsed before a company responded to a cyberattack was 20.9 hours globally. The report surveyed 1,500 cybersecurity professionals about their top cyber concerns.
Among highly regulated, global organizations, Panaseer has determined that the top ten most frequently used security metrics are (in order of popularity):
Someone of a cynical persuasion may think it was only a matter of time until ‘outsourcing’ came to the cybercrime business. While this inevitability may be debatable, the early success of the model certainly isn’t.
The SolarWinds cyber compromise makes Cyber Tactics’ columnist John McClurg reflect and rethink about nation-state adversaries, insider threats, spearphising, AI-machine-powered learning, crimeware-as-a-service and much more. Here, he takes a look at what risks persist within organizations and potential consequences.
By the end of 2020, it is expected that more than 59 zettabytes of data will be generated globally. With access to data from sources such as social media, news and the dark web, encrypted connected security systems, and public and company-proprietary records and communications, physical security and safety professionals are challenged not only with parsing through this “big” data but transforming it into actionable intelligence.