The number of security breaches stemming from stolen or compromised identities has reached epidemic proportions, according to new data from the non-profit Identity Defined Security Alliance (IDSA). The IDSA polled 500 US identity and security professionals to compile...
Document Everything and Audit Regularly This rule is actually two rules in one. Part of maximizing visibility and uncovering vulnerabilities is regular and consistent internal auditing. To most security professionals, an audit is a tedious, and painful process. ...
Nearly a year ago, journalist Martin Banks codified “Five Laws of Cybersecurity”. Cybersecurity is a complicated field, and any way to simplify its many facets into short, easy-to-remember maxims is always welcome. The five laws are a very good start towards...
Proofpoint Records 100,000 Phone-Based Attacks Each Day SMS phishing (smishing) attacks more than doubled year-on-year in 2021 as cyber-criminals looked to exploit human error to compromise devices, according to Proofpoint. The security vendor’s latest annual Human...
Zoom, the videoconferencing platform that has become a staple for connection and communication since the onset of COVID-19, has revealed four recent security vulnerabilities. The vulnerabilities could be exploited to compromise users over chat by sending specially...
Attacks Surge 12% in 2021, According to Leading Insurer A fifth of US and European businesses have warned that a serious cyber-attack nearly rendered them insolvent, with most (87%) viewing compromise as a bigger threat than an economic downturn, according to Hiscox....
Recent Comments