In the rapidly evolving digital landscape, the once-clear boundaries between network resilience and cybersecurity are increasingly blurred. These two critical areas have become interdependent, each reinforcing the other to create a robust defense against the myriad of threats targeting modern businesses. A solid security stance in today’s digital age demands a holistic approach, recognizing how network resilience and cybersecurity not only coexist but support and enhance one another. This synergy… Read More
Jan. 2024 TECH Talk – Cybersecurity in the Fast Lane
A year ago, generative AI caught most businesses by surprise. Listen for a heads up on the cybersecurity trends you can expect in 2024. Topics include: Generative AI Convergence of IT and Security Zero Trust Social Engineering Quantum Cryptography
Quantum Computing: The Next Frontier in Cybersecurity
A year ago, generative AI caught most businesses and governments by surprise. And while individuals, organizations, industry and regulators are only starting to scratch the surface discovering the opportunities and risks this new technology introduces—the next disruptor, quantum computing, is already knocking at the door. In fact, during the recent 2024 World Economic Forum Annual Meeting, IBM warned that quantum computing will wreak havoc on cybersecurity by the end of… Read More
Cyber Attacks Continue Long After They Fade from Headlines
When cybercriminals exploit a new vulnerability and attack a big brand company, it dominates news headlines. Yet, the reality is that adversaries persist in the shadows, long after initial reports fade from public view. Take the mass-exploitation of the MOVEit Transfer vulnerability, as just one example. In late May 2023, Progress Software first disclosed a zero-day vulnerability in their managed file transfer solution. The Clop ransomware gang leveraged the vulnerability… Read More
Embracing “Shift Left” in Cybersecurity
The concept of “shift left” has DevOps origins, and it’s about fostering a culture of responsibility. The aim is to detect issues earlier in a process or cycle, with an awareness that development choices impact the security of an application, its users, and the organization. From a security standpoint, this means integrating security measures at the beginning of the development cycle, rather than as an add-on after completion. Shifting Security… Read More
TECH Talk – Data Exposure from Open Directory Listings
Millions of files with potentially sensitive data have been exposed by 314,000 distinct internet-connected devices and servers with open directory listings. In this month’s TECH Talk, we’ll dive into the recent CyberScoop reporting and Censys research. Open directories provide cybercriminals with a treasure map to a company’s sensitive information such as financial data, backups, network packet capture files, credential and authentication information—the potential for exploitation makes open directories a valuable target for… Read More
What does “Good” Cybersecurity Look Like?
In today’s threat landscape, it’s not a matter of if, but when a cyberattack will happen. How you respond to that attack is what truly matters. For this reason, cybersecurity efforts around threat detection and response are a top priority whether you’re a household brand or an up-and-coming business. But where do you start? What cybersecurity threats and solutions should you consider? How do you prioritize your cybersecurity efforts? To… Read More
What Are the Most Common Cyber Threats?
Without an effective cybersecurity threat detection and response (TDR) strategy in place, organizations put themselves at risk of severe disruption or even destruction when cyberattacks happen. It is a matter of when, not if—in 2022 alone, 76% of survey respondents experienced an attempted ransomware attack, with 64% experiencing a compromise. And word that you’re an easy mark spreads fast. Over two-thirds of those compromised experienced subsequent, multiple attacks. Plus, this… Read More
What Cybersecurity Tools Are Essential for My Business?
As workers and data become more distributed, bad actors are capitalizing on weak security points. In fact, Forbes reports that cyberattacks are nearly twice as frequent in 2023 as they were in 2022. Attacks are not only more frequent–they’re more costly. Verizon’s 2023 Data Breach Investigations Report reveals that the median cost to victims per ransomware incident more than doubled over the past two years to $26,000, with 95% of… Read More
What Is Threat Detection in Cybersecurity?
Cyberattacks are the most nefarious and organized threats modern businesses face. With cyberattacks happening every 39 seconds, taking calculated measures to detect and neutralize threats before your systems are compromised is of the utmost importance. This is where threat detection and response comes into play. Threat detection is the ability to quickly and accurately identify threats to the endpoint, network, applications, or other assets. Threat response is the mitigation efforts… Read More