Mimecast Limited released the latest report from the Cyber Resilience Think Tank highlighting four trends for building and operating a Security Operating Center (SOC).
While employees are the key to identifying cybersecurity vulnerabilities quickly, many companies have failed to create a welcoming environment for whistleblowers. During COVID-19, how can you safely blow the whistle?
To detect and contain breaches faster, it’s become increasingly important to go beyond the typical malware detection capabilities and invest in the ability to detect and react to lateral movement within the environment. Lateral movement is a core piece of an attacker’s strategy once he’s gained a foothold within the environment. What three steps can you take to help stop lateral movement focus on security measures that minimize dwell time?
To find out why people adopt and then sometimes abandon online safety measures, researchers from the University of Michigan School of Information and NortonLifeLock’s Research Group surveyed more than 900 people about their use of 30 commonly recommended practices to guard against security, privacy and identity theft risks.
Ransomware. It may be the most feared word of security and risk managers. After countless headlines and costs of over 11.5 billion dollars in 2019 alone, organizations around the world are understandably terrified of being hit by a ransomware attack. What are four steps you can take to protect against ransomware?
On April 21, the Small Business Administration (SBA) revealed that around 8,000 small business loan applicants had their potentially sensitive information exposed in a data leak affecting the website being used to host the online application.
The latest Kaspersky report highlights the ‘human side’ of cybersecurity incidents by examining the discomfort and losses employees face following corporate breaches.
Forney, Texas Independent School District (ISD) appointed Joseph Sanders as the Director of Safety and Security - another step toward creating an in-house police department.
As with all digital and online tools, there are inherent security risks associated with utilizing video conferencing platforms. What are some concrete steps that consumers and organizations alike can take now to improve security while video conferencing?