Know your VMs from your containers and unikernels in your software infrastructure? Containers may not be as secure as you think and unikernels may offer more speed and security at less cost.
During a M&A process, the scope of the organization’s attack surface is stretched to new limits. Every company, from Fortune 500s to smaller enterprises, has digital baggage that can dramatically increase potential security risks, from multiple generations of technologies, various IT stacks, and new and unknown risks in their environments.
The cyberattack on Colonial Pipeline was a big lesson. It is imperative that critical infrastructure companies uplevel their protection against modern security risks by using modern techniques and automation to comply with new cybersecurity regulations.
Cybercriminals aren’t just hacking for activism or for fun. They’re running their attacks like a business, targeting organisations to extort money – and they’re getting smarter at it. Don’t get complacent, don’t cut corners and shore yourself up against the people lurking in the cyber-shadows.
A major cyber attack on South Korea is usually not a stop-the-presses global news item; it's fairly routine for North Korea and China to make attempts. But what's interesting are the organizational failures that this cyber attack highlights.
What some are calling ‘Industrie 4.0’ or the Smart Factory has become a reality, and has accelerated the digital transformation in the industrial sector. This increased reliance on digital systems has led to an increased emphasis on industrial control systems (ICS) security in the manufacturing sector.
While many people are struck with fear, they also seem paralyzed as they look for what they can do about online threats, cyber crime and control over their data privacy.
The annual ENISA threat landscape report is one of the most helpful tools for keeping a finger on the pulse of current trends in cyber threats. This year's report highlights the dramatic rise in denial of service and cryptojacking attacks.
Cryptocurrency is increasingly being added to businesses' balance sheets because it helps to reach new customers, and it provides a way to avoid many fees. As with any financial asset, the question of how to secure it is moving to the forefront of the CFO’s mind.
According to a new report from security research firm Symantec, cyber criminals and other hacker syndicates are carrying out “formjacking” attacks at an increasing rate, making it one of the fastest growing forms of cyber attacks on the Internet right now.