-
Experts Reveals 29% Surge in Bugs Used by Ransomware Actors
Experts Reveals 29% Surge in Bugs Used by Ransomware Actors There’s been a 29% increase in the number of vulnerabilities exploited by ransomware groups to compromise their targets over the past year, according to a new industry report. The Ransomware Spotlight Year End Report was written by security vendors Ivanti and Cyware alongside CVE numbering authority Cyber Security…
-
Experts Reveals 29% Surge in Bugs Used by Ransomware Actors
Experts Reveals 29% Surge in Bugs Used by Ransomware Actors There’s been a 29% increase in the number of vulnerabilities exploited by ransomware groups to compromise their targets over the past year, according to a new industry report. The Ransomware Spotlight Year End Report was written by security vendors Ivanti and Cyware alongside CVE numbering authority Cyber Security…
-
Government Trials Effort to Make Bug Scanning Easier
Government Trials Effort to Make Bug Scanning Easier The UK’s leading cybersecurity agency has revealed details of a new initiative designed to make it easier for system administrators to root out vulnerabilities across their IT environment. Scanning Made Easy (SME) is the work of GCHQ spin-off the National Cyber Security Centre (NCSC) and its industry collaboration…
-
Government Trials Effort to Make Bug Scanning Easier
Government Trials Effort to Make Bug Scanning Easier The UK’s leading cybersecurity agency has revealed details of a new initiative designed to make it easier for system administrators to root out vulnerabilities across their IT environment. Scanning Made Easy (SME) is the work of GCHQ spin-off the National Cyber Security Centre (NCSC) and its industry collaboration…
-
Home Working Drives 44% Surge in Insider Threats
Home Working Drives 44% Surge in Insider Threats Insider threats cost organizations an average of over $15m annually to remediate last year, with stolen credentials a growing risk, according to Proofpoint. The security vendor’s 2022 Cost of Insider Threats Global Report was compiled from interviews with over 1000 IT professionals and analysis of more than 6800 incidents across the…
-
Home Working Drives 44% Surge in Insider Threats
Home Working Drives 44% Surge in Insider Threats Insider threats cost organizations an average of over $15m annually to remediate last year, with stolen credentials a growing risk, according to Proofpoint. The security vendor’s 2022 Cost of Insider Threats Global Report was compiled from interviews with over 1000 IT professionals and analysis of more than 6800 incidents across the…
-
How to defend Windows networks against destructive cyberattacks
The Russian cyberattacks on Ukrainian organizations reminds us that the attacker isn’t always looking to steal data or extort money. Sometimes they just want to cause as much damage as possible. Both Microsoft and Mandiant recently released information about these destructive attacks and how to better protect against them. Regardless of geographic location, all of…
-
How to defend Windows networks against destructive cyberattacks
The Russian cyberattacks on Ukrainian organizations reminds us that the attacker isn’t always looking to steal data or extort money. Sometimes they just want to cause as much damage as possible. Both Microsoft and Mandiant recently released information about these destructive attacks and how to better protect against them. Regardless of geographic location, all of…
-
Data residency laws pushing companies toward residency as a service
Data residency laws require that companies operating in a country keep data about its citizens on servers located in that country. For companies that have customers or employees in multiple countries, the regulatory requirements can be onerous and difficult to keep up with. Previously, “safe harbor” laws or tokenization-based approaches helped companies address the issue,…
-
Data residency laws pushing companies toward residency as a service
Data residency laws require that companies operating in a country keep data about its citizens on servers located in that country. For companies that have customers or employees in multiple countries, the regulatory requirements can be onerous and difficult to keep up with. Previously, “safe harbor” laws or tokenization-based approaches helped companies address the issue,…