During the Black Hat annual conference in Las Vegas August 3-8, 2019, Thycotic conducted research with nearly 300 attendees identifying either as “hackers” (49 percent) or “security professionals” (51 percent).
The lack of visibility into the expanded cloud attack surface is a fast-growing problem that is only getting worse. Although we have seen misconfigurations in the cloud before, the Capital One breach is a sobering reality check for the security industry. We need to vastly improve threat detection and response in cloud environments.
Cybercrime campaigns and high-profile advanced persistent threat groups are shifting how they target victims and focusing more on intricate relationships with “secure syndicate” partnerships to disguise activity, according to the latest 2019 Cyber Threatscape Report from Accenture.
Of the 15 percent of workers who changed or lost their jobs in the past year, half took confidential company data with them – and 52 percent didn’t view the use of such documents as a crime. A lack of security can impact an organization’s growth and innovation, making it more difficult to meet workforce and customer needs.
Multiple cyber-attacks and compromise of personal information of millions of people globally show that the complexity and intensity of cybersecurity attacks are on the rise, and it could have broader political and economic ramifications. As cybercrimes become more lucrative and cybercriminals become smarter, cybersecurity too will have to be intelligence driven, enabling a swift response to the advanced attacks.
BetterCloud released its first insider threats report: “State of Insider Threats in the Digital Workplace 2019.” The report found that 91 percent of IT and security professionals surveyed feel vulnerable to insider threats, and 75 percent believe the biggest risks lie in cloud applications like popular file storage and email solutions such as Google Drive, Gmail, Dropbox and more.
Organizations are doing some fancy footwork with security these days in order to simultaneously protect users yet empower them to perform various tasks online. As application workloads and activities move to one or more cloud environments, organizations have also begun to ask what they should do to ensure proper cloud security.
A new report from The Bunker has highlighted that senior executives are still often the weakest link in the corporate cybersecurity chain and that cybercriminals target this vulnerability to commit serious data breaches.
Our special feature this month highlights the Department of Homeland Security's newest agency: the Cybersecurity and Infrastructure Security Agency. Also, this month we highlight the Leander Independent School District's data practices that protect student privacy. Security experts discuss video monitoring, cybersecurity for public-private partnerships, privacy and more.