A Russian ransomware group whose leaders were indicted by the Justice Department in December is retaliating against the U.S. government, many of America’s largest companies and a major news organization, identifying employees working from home during the pandemic and attempting to get inside their networks with malware intended to cripple their operations, reports The New York Times.
Vectra® AI released its 2020 Spotlight Report on Healthcare, which shows an upward trend in exploitable behaviors and discredits claims that external threats would lead to increased internal threat activity.
A new white paper from ISACA, ‘Supply Chain Resilience and Continuity: Closing Gaps Exposed in a Global Pandemic’, offers approaches that enterprises can implement to increase the resiliency of their supply chain.
There is hope in these uncertain times: with the right planning and execution, businesses can bounce back from what's quickly becoming a global recession and return to good health. It takes the right strategy, a flexible approach and a desire to achieve organizational resilience.
According to a Linklaters analysis, there has been a major increase of data breach notifications to data protection authorities, with an average increase in notifications of 66 percent compared to Year 1 of the EU General Data Protection Regulation (‘GDPR’).
The question is this. Is this skepticism based on fact or as a result of that well-established human trait – resistance to change? In other words, does the convenience offered by a cloud app outweigh potential security threats such as hacking, and how susceptible are SaaS (Software as a Service) cloud apps to attack in the first place? To answer this question, let’s consider Microsoft Office 365, which is one of the most widely used software packages on the planet with more than 27 million consumer users and over 100 million enterprise users.
From a security perspective, we also tend to look at IoT in the wrong way. With every new device, we assume the technology will be vulnerable with a very high risk of compromise. The reality is that most IoT devices have a very low risk individually, but their functionality is what leaves them susceptible.