What is the best path forward? Should companies upgrade their existing platforms or replace them entirely? What makes the most sense both financially and for the security of your data?
How do you lead a great security team to overall mitigate risks across the entire enterprise? To find out, we talk to Ellen Benaim, Chief Information Security Officer at Templafy. In her role, Benaim is responsible for overseeing company-wide information security and governance program and ensuring the entire organization follows necessary protocols to keep the enterprise secure.
Ransomware attacks were on the rise long before the pandemic. Over the last two years, ransomware attacks have risen by 200% – they are becoming more frequent, more expensive, and more sophisticated. This issue is anticipated to continue throughout 2021 and why businesses must be proactive to manage threats and other actionable steps to mitigate any damage.
In a new alert, the Cybersecurity and Infrastructure Security Agency (CISA) announced that it is aware of several recent successful cyberattacks against various organizations’ cloud services. Threat actors are using phishing and other vectors to exploit poor cyber hygiene practices within a victims’ cloud services configuration.
Fontbonne University in St. Louis announced a partnership with CyberUp, a national non-profit organization dedicated to closing the cybersecurity talent gap by helping adults and youth pursue cybersecurity careers.
How can you protect yourself and your business from digital dangers – and safeguard your privacy and data against a rising wave of online concerns? Inside Scott Steinberg’s new book Cybersecurity: The Expert Guide, readers will discover how to defend against cybercrime – today’s fastest-growing form of criminal activity – and implement best practices and high-tech safeguards that can help them stay one step ahead of hacks, data breaches, phishing attempts, identity theft, online fraud, and other common high-tech threats.
In 2020, ESET researchers observed several attacks exclusively targeting Colombian entities, which have collectively been dubbed Operation Spalax. These attacks are ongoing and are focused on both government institutions and private companies, especially in the energy and metallurgical industries. The attackers rely on the use of remote access trojans, most likely to conduct cyber-espionage activities.
With today’s threat landscape, security and SAM teams need to work together to understand what is installed across network devices and how those are being used for the best asset protection.