Wi-Fi networks, whether in public or private, are by their very nature dirty. Security professionals warn that every network carries inherent risk to our devices, data and resources, because they are exposed a myriad of attacks, including these “Dirty Half Dozen” Wi-Fi risks: eavesdropping; exploits; evil-twin Wi-Fi; lateral network infections; DNS hijacking; and scanning, enumerating…
When humans discovered and learned to ‘obey’ the laws of physics and chemistry, we began to thrive in our world. It enabled us to make fire, build machines much stronger than ourselves, to cure diseases, to fly. What will it take for us to thrive in the world of cyberspace? What are its laws –…
As leaders, the rise of digitization and the cyber risk it presents feels like old news. We’re so inundated with cyber breach stories that we’re almost numb to them. We’re hyper-focused on the bottom line and the digital scale we need to achieve it. Yet it’s become apparent that our digital scale is creating sweeping…
Now that the California Consumer Privacy Act has officially taken effect, follow these 5 steps to ensure compliance, even if your organization is outside the Golden State. According to the Identity Theft Resource Center, more than 164 million consumer records containing personally identifiable information (PII) were exposed in data breaches in 2019. Seemingly every week…
The cloud is hardly new for most industries, but insurance is still in its early days with respect to widespread adoption. While solid progress is being made—a recent report from Novarica shows that more than 70% of insurers now use cloud computing (more than triple the last few years)—most have implemented it only in segments…
The shelter-in-place orders and closure of non-essential businesses that have been implemented to slow the spread of COVID-19 have brought the need for business continuity to the forefront. Most enterprises have shifted to a work-from-home model that allows employees to continue working while adhering to social distancing measures. However, the massive shift to remote work…
In today’s world, every business can be thought of as a software business, comprising hundreds of thousands of applications. However, every application holds an average of 26.8 serious vulnerabilities — a number indicative of today’s modern security landscape where web application attacks remain the leading cause of large breaches by a very wide margin. Hackers…
Greater spending on cybersecurity products hasn’t entailed a better organizational security posture. Despite the millions of dollars spent by organizations year on year, the average cost of a cyberattack jumped by 50 percent between 2018 to 2019, hitting $4.6 million per incident. Labor intensive security solutions like signature-based heuristics, machine learning and threat hunting all…
Cities are the centerpiece for the vast majority of the world’s data production and energy consumption. According to the United Nations, more than half (55 percent) of the global population currently resides in urban areas, and that number is projected to rise to nearly 70 percent over the next three decades. It’s predicted that in…
An otherwise unremarkable find of an open Elasticsearch database containing millions of records became a Sherlock Holmes mystery as researchers cannot figure out the database’s origins. Security researcher Troy Hunt, of Have I Been Pwned, was informed in February about an open database he has named db8151dd containing 90GB of data containing 22.8 million emails.…