Looking Beyond Your Four Walls: Periphery Threat Intelligence

Read Josh Fu’s article about how periphery threat intelligence can help businesses in their cyber security strategy on Infosec Magazine: It is more important than ever to incorporate threat intelligence into your security practice. However, there are many different types of threat intelligence, each with their own merits and uses; the specific type of threat […]

2018 could see more ransomware attacks than ever before

Ransomware has been one of the most potent threats to affect the world in 2017, and next year could bring even more danger for companies and consumers alike, new research has claimed. Read about the new report by SophosLabs titled 2018 Malware Forecast which predicts that the threat of ransomware is only set to continue throughout […]

Global CISOs Unprepared for Evolving Threats

Research by the Ponemon Institute focusing on chief information security officers (CISOs) worldwide has found worrying levels of business readiness for cybersecurity threats. Read about the new study by Ponemon Institute which reveals that 83% of CISOs surveyed said the frequency of data breach will increase or stay the same while another 87% believe the severity […]

The top ransomware attacks of 2017

See the video showing the top ransomware attacks of 2017 on Tech Republic.

Understand Your Risk, Then Invest in Your Small Business Cybersecurity Plan

Read why Michael Guta says that small and medium businesses should understand cyber security risks before investing on Small Biz Trends : Do you know the cost/benefit breakdown of the cybersecurity you have in place for your small business? To be more precise, how much should you invest in cybersecurity protection in relation to your actual […]

The Three Pillars of Hypothesis-Driven Threat Defense

Read Oliver Rochford explain the three pillars of hypothesis driven threat defense on Security Week : Threat hunting is the act of proactively identifying and counteracting an adversary that has gained a foothold in an organizations environment. This contrasts with Threat Detection, that focuses on identifying a threat by approaches such as signature-based detection or the […]

7 Cybersecurity Questions Every Leader Should Ask

Read the seven cyber security questions that every leader should ask according to Kimberly A. Whitler on Forbes : I recently interviewed the former CIO for the White House (under the Bush administration), Theresa Payton, about why marketers must start engaging in cybersecurity before crises like the recent Equifax cybersecurity incident emerge. Read her full article […]

Ransomware is the top threat to business data

New research from research organization the SANS Institute reveals that frontline IT professionals consider ransomware to be the top overall threat to data availability. Insider threats and denial of service are also considered top threats to sensitive data. Read about the new research by SANS Institute which reveals that majority of respondents considered ransomware to be […]

Don’t dismiss insider threats when assessing security

Read why Thomas Fischer says that companies should not dismiss insider threats while assessing cyber security on Beta News : When we think of a cyberthreat, we often imagine a nation state hacking group, or a virus trying to work its way into our company network. After all the media is full of depictions of incidents […]

The Cybersecurity Threats Presented by Financial Services Remote Employees

Security and IT professionals at large enterprises across all industries are faced with the daily task of having to secure an expanding attack surface. Vulnerable points of entry used to live within the organization’s walls, where firewalls and inline security tools could protect them. Read about the cyber security threats by remote employees in financial […]