Ad Hoc or Managed Penetration Testing: Which One Is Best for You?
September 9, 2020
Penetration testing is no longer an extraordinary security engagement. Due to regulatory mandates, internal policies, business executive requests and the overall desire to avoid becoming the next breach victim, testing is now commonplace among many organizations. TheĀ kind of testing, however, canā¦
0 Comments8 Minutes
The Modern Workplace: Keeping Remote Workers Productive and Secure
September 9, 2020
Keeping Remote Workers Productive and Secure Results from the March 30, 2020,Ā Gartner CFO SurveyĀ indicate that 74% of businesses intend to shift some employees to permanent remote work following their initial experience responding to current global conditions. Regardless of recent world events,ā¦
0 Comments11 Minutes
Securing Data in a Multicloud Environment
September 8, 2020
Securing Data The multicloudĀ environment is becoming the standard for businesses, with 93% of organizations using this approach, according to aĀ Flexera 2020 State of the Cloud report. The public cloud services used in the multicloud strategy are gaining in popularity, with Gartnerā¦
0 Comments5 Minutes
Why Adversarial Examples Are Such a Dangerous Threat to AI Deep Learning
September 7, 2020
Technologies like artificial intelligence (AI) and neural networks are driven by deep learning ā machine learning algorithms that get āsmarterā with more data. TheĀ deepfake, a severe cybersecurity threat, wouldnāt be possible without deep learning. Deepfakes aside, we need to be aware that severalā¦
0 Comments9 Minutes
DDoS Attacks Increase in Size, Frequency and Duration
September 4, 2020
Distributed denial of service (DDoS) attacks are increasing in size, frequency and duration. Kaspersky LabĀ reportedĀ a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. Kaspersky also found thatā¦
0 Comments8 Minutes
Build a Roadmap for Cyber Resilience
September 4, 2020
The current information security landscape is rapidly evolving.Ā According to the latest research from IBM Security and the Ponemon InstituteāsĀ 2020 Cyber Resilient Organization Report,Ā 67% of organizations reported that the volume of attacks had significantly increased over the past 12 months. Itāsā¦
0 Comments8 Minutes
Whatās New in the 2020 Cost of a Data Breach Report
September 3, 2020
In a world of uncertainty and change, itās a comfort that some things are consistent year after year. Now in its 15th year, the annualĀ Cost of a Data Breach Report, with research by the Ponemon Institute and published by IBM Security, continues to provide a detailed view of the financial impactsā¦
0 Comments12 Minutes
New Ponemon Report: New Ponemon Report: A Programmatic Approach to Vulnerability Management for Hybrid Multicloud
September 3, 2020
X-Force RedĀ is unveiling a new research study, conducted by the Ponemon Institute, that highlights vulnerability management challenges for on-premises and cloud environments: in other words,Ā hybrid multicloud. The report, āThe State of Vulnerability Management in the Cloud and On-Premises,ā isā¦
0 Comments8 Minutes
Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers
September 2, 2020
Cyberthreats in Gaming Cyberthreats in Gaming landscape has changed drastically over the past few decades. Some of these changes have led to considerable developments in the cyberthreat landscapeĀ as it applies to gaming companies, the games themselves and the user base that enjoys them.ā¦
0 Comments12 Minutes
Protect Your Critical Assets in a Landscape of Expanding Attack Surfaces
September 2, 2020
Critical Assets Imagine: You just received an alert that threat actors infiltrated your network, leaked mission-critical data and posted it in publicly accessible forums on the dark web. What do you do? As a security leader, you knew that a breach was inevitable. Your data, applications andā¦
0 Comments9 Minutes