Today, nearly 70% of organizations host more than half their workloads in the cloud, up from just 31% in 2020. But there’s a dangerous pothole on the fast track to cloud migration, and it grows larger the longer it’s ignored: application development security.
The good news is that wherever you are on the journey...
In this episode of "Cybersecurity Unplugged," Joe Weiss, managing partner at Applied Control Systems, offers suggestions for how to harden our OT networks today, including what CISOs need to know and how guidance from the federal government needs to change.
A banking Trojan is on a rampage thanks to its ability to mimic the appearance of more than 400 applications, including leading financial and crypto exchange applications, in 16 countries. Godfather is an upgraded version of the Anubis banking Trojan, reports cybersecurity firm Group-IB.
Observability is not necessarily a commonly understood term in cybersecurity circles. What exactly does it mean in context, and how does it relate to security? Jackie McGuire of Cribl discusses the observability pipeline and how best to build a solution.
It's been another watershed year for cybersecurity practitioners and leaders. How would one describe the state of security and data as we head into 2023? Jackie McGuire of Cribl weighs in with her observations and predictions for the new year.
For many brands, especially large enterprises with a substantial online presence, it is important to be able to have eyes all over the internet in order to properly mitigate the effects of external elements on their brand’s reputation.
After years of digital transformation, cloud migration and deployment of hybrid workforces, enterprises have more endpoints than ever, which makes it important to take endpoint security to a whole new level. Pat Correia of Cisco Security shares five tips for choosing endpoint security.
Microsoft's last monthly dump of patches for 2022 includes a fix for a zero-day exploited by ransomware hackers to bypass the SmartScreen security mechanism for malware execution. The zero-day hinged on hackers creating a malformed Authenticode signature.
At the vanguard of pediatric medical research, Seattle Children's Hospital's work in cancer therapies, genetics, neuroscience, immunology, and infectious diseases is recognized internationally. As a premier health and research organization, Seattle Children's must maintain a strong security posture without stifling...
Ditch your checklist of requirements and take a strategic approach to protecting your data and data privacy! Read this Forrester report to learn how to build core capabilities for data protection that are shared across security best practices, standards, and compliance requirements.
The proliferation of cyberattacks has become an existential threat for businesses no matter where or how they operate in the global economy. Cunning threat actors engineer shapeshifting cyberattacks that pose potentially grave risks to organizational operations, data security, systems uptime, and revenues.
Everything...
Targeted attacks continue to increase, ranging from malware campaigns, phishing, insider threats, and others. In addition to factors such as the rapid pace of digital transformation and rising attacks, many Enterprise Security Decision Makers cited a lack of integrated cybersecurity solutions as a barrier to...
The purchase of healthcare security startup Medigate means Claroty can address the IoT, OT, IoMT and connected device needs of hospitals from a single platform. Claroty says its single-platform approach facilitates everything from network mapping and segmentation to continuous threat detection.
Industrial operational technology (OT) networks are continually targeted. From the hacking of LNG producers just before Russia invaded Ukraine, Toyota’s temporary shutdown of 14 factories after a supplier was breached, or compromising a nuclear power plant’s ICS and SCADA systems, attacks against industrial...
A novel botnet dubbed "Zerobot" by Fortinet researchers is taking advantage of vulnerabilities in a slew of networking equipment and networked cameras with an emphasis on equipment manufactured in East Asia. The botnet exploits 21 separate vulnerabilities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.