The Global Threat Report from Zix highlighted the significance of business email security, detailing the status of malware delivered via email in 2021.
Critical infrastructure industries, especially those in the manufacturing, logistics and oil and gas sectors, have recently faced high-profile cyberattacks. How and why are these sectors targeted, and what can cybersecurity professionals do to secure their organizations?
Stolen credentials and orphaned accounts can be abused to perform all manner of malicious activity online. Security professionals can enact many strategies to combat this situation.
Teresa Shea, Vice President of Cyber Offense and Defense at Raytheon Intelligence and Space, talks to Security staying on top of security threats, the overlap between national and enterprise threats, and defending against emerging cybersecurity threats.
As organizations shift to permanent hybrid work environments, security leaders must weigh the benefits and challenges of a Bring Your Own Device (BYOD) model.
Water and wastewater (WWS) facilities are under attack, along with the recent increase in critical infrastructure cyberattacks. A joint statement from the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Agency (CISA), the Environmental Protection Agency (EPA) and the National Security Agency (NSA) details recent attacks and what WWS systems can do to bolster their cyber defense.
During a time where hospitals are already strapped for resources, Mercy Iowa City hospital reported that an internal email compromise and phishing email incident led to the exposure of personal information of some 60,473 individuals.
A recent Outbound Email Security Report revealed that stressed, tired employees are behind four in 10 of the most severe data breach incidents. As stress levels rise, rushed employees are more likely to make simple mistakes such as sending an email to the wrong person, or attaching the wrong file.
The Keepnet Labs 2020 Phishing Trends Report found that 90% of successful cyberattacks occur through email-based attacks. The report also found that top sectors where breaches occur.