Companies rely on data transfers to communicate between departments and with clients. However, there are several risks if these data transfers are insecure. If insecure file transfer methods such as unencrypted email or cloud services are used, companies can open themselves up to potential exploitation by malicious actors. When considering data transfer security, one of […]
Threats to email security are on the rise. Without sufficient strategies, companies open themselves, their clients and customers to the consequences of cyber security incidents such as phishing, data breaches and business email compromise (BEC). They must protect this vulnerable asset without compromising its efficiency in communication. These threats to the internal working of the […]
Cybercrime is evolving and phishing attacks are becoming more targeted. Still, some 75 percent of ransomware attacks continue to originate from email, with attackers working together to hunt down the smallest of openings to generate multi-million-dollar ransoms. Cyber Security Hub’s research reveals that phishing and social engineering attacks remain the biggest threats to organizations in […]
Heightened cyber threats from state-supported groups, the evolution of threat actors’ tactics and the ongoing trend for remote working have combined with the ongoing skills shortages within the cyber security sector to place further pressure on CISOs. The publication of the CS Hub Mid-Year Market Report 2022 offers a timely analysis of trends, innovations and […]
Companies of all sizes are being challenged to install policies and secure data on a growing number of devices, which leads to an increased volume of alerts to be managed. All this, while balancing the skills and resources gap in IT and cyber security. CISOs and security owners, especially those operating small and medium sized […]
In the face of new and emerging threats cyber security executives must remain vigilant but also creative as they attempt to protect their organizations against today’s threat actors. Ever-innovating threats require CISOs to consider moving from a reactive strategy that relies on traditional antivirus solutions to a prevent-first strategy that stops the threat before it […]
The number of applications in the cloud is on the rise and with it comes inherent security risks. Cyber Security Hub’s Cloud Configuration Security Practices survey shows that there is an avalanche of cloud applications coming in the next 12 months and now is the time for organizations to adopt efficient and effective cloud security […]
Today, DevOps is seen as a crucial way to reduce application vulnerability and increase speed to market by baking security into the development process.While the benefits are undisputed, the challenge to doing DevSecOps well lies in the ability to successfully integrate the previously distinct development and security structures within an organisation, talent shortages and effectively […]
The 2021 CSHub Mid-Year Cyber Spend & CISO Trends Report is here. Hundreds of cyber security leaders completed the CSHub mid-year survey to providing key insight into the past present and future of cyber security. Areas of insight include: Attacks, Threat Vectors, Vulnerabilities & Controls Frameworks, Regulations, Standardizations & Mindset Budget, Spend […]