Cybersecurity
Category Added in a WPeMatico Campaign
A major US hospital network, Prospect Medical Holdings, has been the victim of a ransomware-based cyber attack. The cyber attack has caused outages across the company’s network, which is responsible for operating 16 hospitals in California, Connecticut, Pennsylvania and Rhode Island, in addition to 166 outpatient centers and clinics. The network issues were first reported […]
UK election watchdog, The Electoral Commission (TEC), has been the victim of a “complex” cyber attack which has potentially exposed the data of more than 40 million voters. News of the cyber attack was published in an FAQ on the commission’s website on August 8. In the post, TEC explained that the cyber attack was discovered […]
Two UK police forces have admitted to a data breach caused by a “technical error” that saw the personally identifying information of victims, witnesses and suspects mistakenly posted online following Freedom of Information (FOI) requests. Norfolk and Suffolk police admitted on August 15 that the data of 1,230 people was included in files published to […]
Cloud migration led to cloud evolution which has led to a cloud-first mindset. With a pandemic push, global corporate enterprise has gravitated to the exponential perimeter. The four cornerstones of cloud security now must be realized. Accountability: With a hat-tip to the RACI matrix, identifying responsibility Strategy: Envisioning a cloud security roadmap moving […]
The 2021 CSHub Mid-Year Cyber Spend & CISO Trends Report is here. Hundreds of cyber security leaders completed the CSHub mid-year survey to providing key insight into the past present and future of cyber security. Areas of insight include: Attacks, Threat Vectors, Vulnerabilities & Controls Frameworks, Regulations, Standardizations & Mindset Budget, Spend […]
Today, DevOps is seen as a crucial way to reduce application vulnerability and increase speed to market by baking security into the development process.While the benefits are undisputed, the challenge to doing DevSecOps well lies in the ability to successfully integrate the previously distinct development and security structures within an organisation, talent shortages and effectively […]
The number of applications in the cloud is on the rise and with it comes inherent security risks. Cyber Security Hub’s Cloud Configuration Security Practices survey shows that there is an avalanche of cloud applications coming in the next 12 months and now is the time for organizations to adopt efficient and effective cloud security […]
In the face of new and emerging threats cyber security executives must remain vigilant but also creative as they attempt to protect their organizations against today’s threat actors. Ever-innovating threats require CISOs to consider moving from a reactive strategy that relies on traditional antivirus solutions to a prevent-first strategy that stops the threat before it […]
Companies of all sizes are being challenged to install policies and secure data on a growing number of devices, which leads to an increased volume of alerts to be managed. All this, while balancing the skills and resources gap in IT and cyber security. CISOs and security owners, especially those operating small and medium sized […]