This edition of the ISMG Security Report features an analysis of key takeaways from the breaches tied to flaws in the Accellion File Transfer appliance. Also featured: Equifax CISO Jamil Farshchi on transforming supply chain security, plus an analysis of how "work from anywhere" is affecting cybersecurity.
Security professionals have been thrust to the forefront of return-to-work planning as the crisis continues to create a complex set of security and safety challenges. Preparing to return to the physical workplace means adapting to new requirements, implementing new procedures and leveraging technology to alleviate...
Remote business operations and distributed workforce has triggered an urgency for deploying new technologies, applications and cloud-native solutions. There is a lack of cohesion between threat response and implementing new security policies and configurations, and a resulting lack of essential context that shapes...
Next–generation firewalls demand streamlined, comprehensive management from rule creation to termination.
Download this solutions brief to learn how to turn complex firewall change requests into a secure, manageable and
automated workflow as well as recertification
requirements in compliance standards such as...
The ongoing lockdown may be complicating the path of Cupid's arrows. But as another Valentine's Day rolls around, authorities are warning that romance scammers - and other types of fraudsters - are alive and well and have been increasingly preying on unsuspecting victims around the world.
It's one thing to plan for a remote workforce. Quite another when you suddenly have to deploy and support it - at 100%. Martin Mazor of Entertainment Partners discusses the vital role of identity in his enterprise's unique business.
Good news on the cybercrime front: "Cryptocurrency-related crime fell significantly in 2020," compared to 2019, reports blockchain analysis firm Chainalysis. Unfortunately, in the same timeframe, ransomware profits surged 311%, stoking calls for a crackdown on ransom payments.
As the U.S. marks its first anniversary of fighting COVID-19, pandemic expert Regina Phelps says the next several, critical weeks come down to two vital words: vaccines and variants. "Those are going to determine our destiny for the long and foreseeable future," she says.
The U.S. Cybersecurity and Infrastructure Security Agency warns that hackers are increasingly targeting cloud services by waging phishing schemes and brute-force attacks. CISA recommends a number of defenses, including regularly reviewing Active Directory sign-in logs and enforcing multifactor authentication.
The "remote workforce" of 2020 is gone. Now we're talking about the new, permanent "branch office" - and it comes with its own unique set of cybersecurity concerns, says Derek Manky of FortiGuard Labs. He discusses new social engineering trends and how to respond.
Cybersecurity has long been a
challenge across industries. Now that
most organizations are firmly in the age
of digital transformation, protecting
against threats is increasingly complex
but also crucial to shield against
financial and reputational damage.
With hybrid infrastructures accommodating
Ransomware gangs entered 2020 with a full and dangerous set of weapons at their disposal and then rolled out additional tools such as extortion and new distribution methods, a trend that is expected to continue into 2021.
Until May, all Apple iOS devices were vulnerable to a "zero-click exploit" that would have allowed hackers to remotely gain complete control and view all emails, photos, private messages and more, says Google security researcher Ian Beer. He alerted Apple to multiple vulnerabilities - all now patched.
The pandemic only amped up the need for better bandwidth, visibility and centralized management, and all within a budget that will make it possible. Prior to COVID-19, Kumar Ramachandran of Palo Alto Networks declared 2020 the “year of the early majority” for SD-WAN adoption.
Ramachandran, former CEO of...
The U.K. is moving to improve its ability to combat online attacks via the establishment of an information warfare network named @HutEighteen. The move, announced by the Defense Academy of the United Kingdom, follows fresh EU sanctions against nation-state hackers and the U.K. standing up a National Cyber Force.