- NAKIVO v9.2 Comes With Support For Microsoft Office 365 Backup
- Key Questions for Cloud Service Providers That Companies Can Ask
- Major vulnerabilities found in popular wireless presentation system
- Top enterprise analytics trends for 2020
- Windows 7 is reaching end-of-extended-support, what to do?
How to Secure Critical Infrastructure When Patching Isn’t Possible
Cyberattacks are on the rise and threatening our digital life and our most intimate information — but also our operational realities. Read More
The importance of risk reduction for robotic process automation
Less than half of organizations have a privileged access management strategy in place for digital transformation technologies, like RPA, according to a CyberArk report.
The report provides practical recommendations from information security executives based on their first-hand experiences. They share key recommendations for how organizations can securely adopt RPA while mitigating potential risks, including: Read More
Increased monetization means more ransomware attacks
Organizations are detecting and containing attacks faster as the global median dwell time, defined as the duration between the start of a cyber intrusion and it being identified, was 56 days. This is 28% lower than the 78-day median observed in the previous year, according to FireEye.
Cyber Criminals Choosing APIs as Choice of Target to Attack Financial Institutions
Akamai Technologies has published the Akamai 2020 State of Internet / Security: Hostile Takeover Attempts report which revealed that from May 2019 till this day there is a shift in mode of attack from cyber criminals who started attacking APIs. In this report, the application programming interfaces, or APIs, that criminal targeted with credential stuffing attacks using REST and SOAP to access resources. This includes account summary pages with personal information, account records, and balances, as well as other tools or services within the platform. This was done in an effort to bypass all security controls. Read More
Attackers Target US Critical Infrastructure, CISA Issues Warning
Attackers targeted a gas compression plant with a spear-phishing emails to infect its network with ransomware.
The victim organization lacked robust segmentation between its IT and OT networks, allowing the attacker to pervade both.
The Department of Homeland Security (DHS) revealed that a ransomware attack on a US natural gas facility forced it to shut down operations for two days. Read More
US Senator Proposes New Data Protection Bill
The senator argues that the FTC Act does not address data protection challenges.
The law, if passed, would apply to any company with revenues over $25 million, or which manages the personal data of 50,000 or more people.
A US senator for New York announced draft legislation known as the ‘Data Protection Act’ to establish an independent data protection agency in the country. Read More