Cybersecurity’s dual role as solution and critical enabler makes the market fascinating to cover: cybersecurity is never done, and the cyber community is in a perpetual state of learning.
Security data can drive larger decisions about where an organization’s biggest business risks lie and how to best mitigate them. But two interwoven challenges prevent companies from drawing out that value: First, security teams are too overwhelmed by their data to analyze and use it effectively. Second, security leaders cannot translate that data and what…
The enforcement deadline for the California Consumer Privacy Act (CCPA) passed a couple of weeks ago, so for all intents and purposes it’s now in effect. The CCPA was modeled after the European Union’s General Data Protection Regulation (GDPR) that requires companies to share how personal data gets collected and gives consumers the option to…
Each year, cybercriminals gather on the dark web in preparation for one of the great cybercrime events in the world: Tax Day in the United States. As millions of Americans prepare to file their taxes on Wednesday, hackers are taking to the infamous dark web marketplaces in a flurry of activity aimed at the buying…
Now that millions of people are suddenly working from home because of the COVID-19 pandemic, companies need ways to create a connected and protected remote business and workforce. This switch to remote work has accelerated digital transformation efforts at many companies. A recent survey by OpsRamp found that 73 percent of IT managers expect to…
Honeypots are deception technology’s earliest ancestor. IT security researchers started using them in the 1990s to deceive malicious actors who had made it onto the network by interacting with a false system. In this way, honeypots could gather intelligence on and assess the behavior of these malicious actors. They were not created for threat detection.…
COVID-19 has accelerated changes in the way attackers hit web applications. Based on behaviors we observed during our research, we developed five predictions on how web application security will change as we come out of the COVID-19 period – and what security pros can do about it. 1. More sophisticated account takeover (ATO) attacks. The…
Data has become more valuable than ever and organizations must make protecting it a top priority. According to IBM and the Ponemon Institute, the average data breach now costs American companies $8.19 million. On top of that, the recently-released Verizon Data Breach Investigations Report found that 86 percent of all breaches were financially-motivated. As attacks…
While the dark web offers a haven for criminals and serves as inspiration for Hollywood blockbusters, it’s much more mundane in real life. Still, many businesses feed into the fallacies surrounding the dark side of the Internet, ultimately delaying their ability to protect employees and consumers. Our industry really needs to shed some light on…
The Zero Trust security framework turns 10 years old this year. It started as a simple concept: treat every user and all packets the same, as untrusted and potentially malicious. According to Forrester Research, which created the Zero Trust model, it has evolved from a focus on firewalls and data isolation to becoming a…