Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Over Half of Fortune 500 Companies Are Leaving Sensitive Information Open to Reconnaissance via Document Metadata

PDF document metadata can contain a variety of information that provides attackers with the reconnaissance details they need to execute…

2 hours ago

EU Agency for Cybersecurity Says Autonomous Vehicles Highly Vulnerable to Various Cybersecurity Challenges

The EU Agency for Cybersecurity says that autonomous vehicle manufacturers should address various cybersecurity challenges before venturing on European roads.

7 hours ago

Over 6,700 VMware Servers With Remote Code Execution Security Bug Exposed to the Internet

Mass scanning activity targeting VMware servers with the remote code execution security bug after a Chinese researcher released proof of…

3 days ago

The Growing Problem of Marketing Fraud: Bots Pose as Legitimate Internet Users to Fake Traffic, Milk Digital Advertising Services

Report from White Ops demonstrates that marketing fraud is growing, but that many in the online advertising space may not…

3 days ago

Reflecting Back on Data Privacy Day 2021: Why This Day Mattered More Than Ever Before

The CMMC framework raises the bar for DOD contractors and is apropos in the wake of such events as the…

3 days ago

macOS Malware Silver Sparrow Affects About 40,000 Macs Running Both Intel and ARM Chips

Red Canary researchers said Silver Sparrow macOS malware infecting about 40,000 Macs using both Intel and ARM chips could deliver…

4 days ago

New York Cyber Task Force Report Identifies Near-Term Cyber Defense Challenges, Calls for Increased Government and Private Industry Collaboration

Report prepared by the New York Cyber Task Force examines the leading cyber defense challenges and finds that coordination between…

4 days ago

A Digital New Deal: How Can We Tackle the Worst Economy Since the Great Depression?

As part of a Digital New Deal, cybersecurity bootcamps will play a pivotal role in improving the earning potential of…

4 days ago

Securing the Devices That Underpin Our Critical Infrastructure

Challenge in securing critical national infrastructure (CNI) can be boiled down to the fact that many of these systems were…

5 days ago

Application Security Backsliding, Over 70% of Organizations Say Their Portfolio Is More Vulnerable

Ponemon and WhiteSource report on application security indicates that most large enterprise-scale organizations feel that their portfolio of applications has…

6 days ago