Cybersecurity
Category Added in a WPeMatico Campaign
Two UK police forces have admitted to a data breach caused by a “technical error” that saw the personally identifying information of victims, witnesses and suspects mistakenly posted online following Freedom of Information (FOI) requests. Norfolk and Suffolk police admitted on August 15 that the data of 1,230 people was included in files published to […]
Cloud migration led to cloud evolution which has led to a cloud-first mindset. With a pandemic push, global corporate enterprise has gravitated to the exponential perimeter. The four cornerstones of cloud security now must be realized. Accountability: With a hat-tip to the RACI matrix, identifying responsibility Strategy: Envisioning a cloud security roadmap moving […]
The 2021 CSHub Mid-Year Cyber Spend & CISO Trends Report is here. Hundreds of cyber security leaders completed the CSHub mid-year survey to providing key insight into the past present and future of cyber security. Areas of insight include: Attacks, Threat Vectors, Vulnerabilities & Controls Frameworks, Regulations, Standardizations & Mindset Budget, Spend […]
Today, DevOps is seen as a crucial way to reduce application vulnerability and increase speed to market by baking security into the development process.While the benefits are undisputed, the challenge to doing DevSecOps well lies in the ability to successfully integrate the previously distinct development and security structures within an organisation, talent shortages and effectively […]
The number of applications in the cloud is on the rise and with it comes inherent security risks. Cyber Security Hub’s Cloud Configuration Security Practices survey shows that there is an avalanche of cloud applications coming in the next 12 months and now is the time for organizations to adopt efficient and effective cloud security […]
In the face of new and emerging threats cyber security executives must remain vigilant but also creative as they attempt to protect their organizations against today’s threat actors. Ever-innovating threats require CISOs to consider moving from a reactive strategy that relies on traditional antivirus solutions to a prevent-first strategy that stops the threat before it […]
Companies of all sizes are being challenged to install policies and secure data on a growing number of devices, which leads to an increased volume of alerts to be managed. All this, while balancing the skills and resources gap in IT and cyber security. CISOs and security owners, especially those operating small and medium sized […]
Heightened cyber threats from state-supported groups, the evolution of threat actors’ tactics and the ongoing trend for remote working have combined with the ongoing skills shortages within the cyber security sector to place further pressure on CISOs. The publication of the CS Hub Mid-Year Market Report 2022 offers a timely analysis of trends, innovations and […]
Cybercrime is evolving and phishing attacks are becoming more targeted. Still, some 75 percent of ransomware attacks continue to originate from email, with attackers working together to hunt down the smallest of openings to generate multi-million-dollar ransoms. Cyber Security Hub’s research reveals that phishing and social engineering attacks remain the biggest threats to organizations in […]