Advertise

Advertise

Preparing for what’s next: Innovation also brings cybersecurity risk

Today’s CIOs have an unprecedented challenge on their hands. They are spearheading digital transformation efforts, creating revenue-generating applications, enabling remote work and driving seamless customer experiences. This new business environment also created a veritable playground for attackers, making it hard to strike the right balance between innovation and security. Most attacks today follow a similar…

In an increasingly complex world, AI is the only way forward

The technology environment in which businesses and society operate is becoming increasingly complex. Smart cities now rely on tools like AI to coordinate things like traffic, power, and emergency systems. Distributed manufacturing platforms use it to respond to consumer demand in near-real-time. Massive data centers depend on intelligent systems to process elephant flows of information…

Form-based phishing attacks impersonate branded file-sharing, productivity sites

Researchers are warning users to be on the lookout for form-based phishing attacks whereby scammers abuse or imitate branded file-sharing, content-sharing and productivity websites in order to trick users into giving up their credentials or their account access. In a blog post on Thursday, Barracuda Networks says that from January through April 2020, these form-based…

How to Protect Your Applications From Sophisticated Bot Attacks

Today’s sophisticated bots reside on compromised residential devices, enabling  fraudsters to blend in with legitimate user traffic across the web. These sophisticated  bots can mimic human keystrokes, mouse movement, and browser history. They look and  act like humans when they visit websites and commit fraud and abuse of applications  including account takeover attacks, automated account…

COVID-19: You won’t get a pass on cybersecurity

The COVID-19 outbreak provides ripe opportunities for criminal actors to exploit fear, uncertainty, and companies ill prepared to to secure remote workers, driven to home offices by travel restrictions and social-distancing. The first threat comes in the form of misinformation and weaponized websites and documents. Websites and apps with outbreak maps are attracting unwitting victims…

Applying the 80/20 Rule to Cloud Security

The 80/20 rule, which was first introduced as Pareto’s principle in 1941 by American engineer Joseph Juran, suggests that 20 percent of your activities (in life, business, athletics, etc.) will account for 80 percent of your results. Simply put: work smarter, not harder.   How can we apply Pareto’s principle to cloud security? Within your security activities, what is the key 20 percent that will produce 80 percent of your results when it comes to reducing risk?  One effort that absolutely falls into the…

facebook

Hackers ran ad scams after hijacking account at Facebook data partner LiveRamp

Hackers took over the account of an employee at LiveRamp – one of Facebook’s significant data partners and a marketer extraordinaire that helps advertisers target ads – to access its Business Manager account and launch a campaign to run scam ads, tapping other user accounts to pay for them and deceiving customers. “The instance to…

The Dearth of Skilled Cybersecurity Personnel

The cybersecurity industry is currently experiencing a shortage of trained staff in epidemic proportions.   While complex and sophisticated malware is generated in increasing numbers daily, the skilled personnel needed to prevent or remediate the ever-increasing malevolent code is simply not to be found. In 2018-2019, 53 percent of organizations reported a “problematic shortage” of cybersecurity…

Next post in Advertise