DDoS Attacks Increase in Size, Frequency and Duration
September 4, 2020
Distributed denial of service (DDoS) attacks are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. Kaspersky also found that…
0 Comments8 Minutes
Build a Roadmap for Cyber Resilience
September 4, 2020
The current information security landscape is rapidly evolving. According to the latest research from IBM Security and the Ponemon Institute’s 2020 Cyber Resilient Organization Report, 67% of organizations reported that the volume of attacks had significantly increased over the past 12 months. It’s…
0 Comments8 Minutes
What’s New in the 2020 Cost of a Data Breach Report
September 3, 2020
In a world of uncertainty and change, it’s a comfort that some things are consistent year after year. Now in its 15th year, the annual Cost of a Data Breach Report, with research by the Ponemon Institute and published by IBM Security, continues to provide a detailed view of the financial impacts…
0 Comments12 Minutes
New Ponemon Report: New Ponemon Report: A Programmatic Approach to Vulnerability Management for Hybrid Multicloud
September 3, 2020
X-Force Red is unveiling a new research study, conducted by the Ponemon Institute, that highlights vulnerability management challenges for on-premises and cloud environments: in other words, hybrid multicloud. The report, “The State of Vulnerability Management in the Cloud and On-Premises,” is…
0 Comments8 Minutes
Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers
September 2, 2020
Cyberthreats in Gaming Cyberthreats in Gaming landscape has changed drastically over the past few decades. Some of these changes have led to considerable developments in the cyberthreat landscape as it applies to gaming companies, the games themselves and the user base that enjoys them.…
0 Comments12 Minutes
Protect Your Critical Assets in a Landscape of Expanding Attack Surfaces
September 2, 2020
Critical Assets Imagine: You just received an alert that threat actors infiltrated your network, leaked mission-critical data and posted it in publicly accessible forums on the dark web. What do you do? As a security leader, you knew that a breach was inevitable. Your data, applications and…
0 Comments9 Minutes
Are Current Security Assurance Models Suitable for the Digital World?
September 1, 2020
With the constantly transforming cyber landscape, intruders are always finding new ways to exploit weaknesses in organizations’ systems and applications. As a result, cyber-related incidents have become one of the top risks to businesses as they attempt to understand their cyber resilience and…
0 Comments7 Minutes
Updating Legacy Systems Amid Growing Cybersecurity Concerns
August 31, 2020
Over the past few months, a shift to remote working has raised many security questions for businesses trying to protect their data. And, ensuring that legacy systems are secure is a key priority. Keeping legacy systems up to date in a world of increasing cyber threats has been a concern the past…
0 Comments5 Minutes
Why Zero-Click Cyberthreats Should Be on Your Radar
August 31, 2020
Zero-Click Cyberthreats For years, the statistics have told us that human error is the greatest contributor to cyberattacks. We’ve stressed the importance of training, training and more training to prevent the almost inevitable from happening. We’ve been convinced that the key to defending against…
0 Comments8 Minutes
Digital Transformation: Breaking Down Silos for Better Data Security
August 27, 2020
Today, enterprises are under pressure to improve the power and reduce the cost of running mission-critical business applications by migrating to modern software architectures. By breaking down the silos between adjacent teams and the tools they use, security teams can do this at the same time as…
0 Comments6 Minutes