Preventing adversaries from capitalizing on this growing attack surface is now a priority for IT and security teams, who have reacted by increasing investment. But for many, these siloed investments are generating additional complexities. This is mirrored in recent ESG research that has found that 55% of organizations...
As more devices connect to networks, keeping track of them all is job number one. What is connected? Are those devices vulnerable? Where do they communicate? Who can access them? What active threats are out there? It's confusing to say the least. To clear this confusion, you need to make sense of all your XIoT. Each...
Ransomware-as-a-service, supply chain attacks and the Russia/Ukraine war - they all are factors behind the growing need for digital executive protection outside the traditional workplace. Chris Pierson of BlackCloak shares new research and insights.
As the threat landscape continues to evolve with a perpetual influx of new network anomalies and Indicators of Compromise (IOC), prudent defenders must focus on more actionable elements of attack characteristics, such as Tactics, Techniques and Procedures (TTPs). One such example of this is the Initial Access...
Managing risks begins with measuring risks. But how do you measure risks accurately? How do you share your findings in a meaningful way to both technical and non-technical audiences?
When measuring risk, the focus should be on what’s meaningful to your audience. And for the most important decisions about...
Tenable has agreed to purchase startup Bit Discovery for $44.5 million to help companies discover, attribute and monitor assets on the internet. The deal will allow Tenable to identify vulnerable internet-facing assets that could be attacked.
Gartner projects that in 2022, Endpoint Protection Platforms will take the #1 spot in information security software spending, reaching $15.9B and will continue increasing gap with the second largest segment throughout 2026 reaching $29.2B.1
Will this increase in spend result in a decrease in successful endpoint...
Every connected device is now considered a part of the Extended Internet of Things (XIoT). When securing XIoT devices that connect to networks, it can be hard to account for all the nuances required to secure them. What simplifies the process of delivering contextually aware threat detection and recommendations is an...
Older consumers are considered a more vulnerable population. They are the best kind of customers, and cybercriminals know that. They are known for having better credit and more funds, tend to be more trusting, and lack familiarity with new digital technologies. Fortunately, there is a way to help financial...
For this report, Duo Data Science analyzed data from more than 36 million devices, more than 400 thousand unique applications and roughly 800 million monthly authentications from across our customer base, spanning North America, Latin America, Europe and the Middle East, and Asia-Pacific.
Regulators should require all medical device makers to include a baseline of certain cybersecurity protections in their products and to build in a feature that allows safe vulnerability scanning of their devices, says researcher Daniel Bardenstein, a strategist at CISA.
The Data Divide spans sectors, organizations,
individuals and communities — and not for a shortage
of data but for a shortage of focus beyond “productivity,
efficiency and innovation.” But it doesn’t have to be that
way. There are interventions, new ways of working and
strategies for overcoming the Data...
Changing smartphone devices is a regular, routine activity. But when it comes to authenticating the newly acquired device with the user’s apps, it may not be such a trivial task for the new smartphone owner.
This edition of the Incognia Mobile App Friction Report contains data and analysis of the friction for...
Typically, when manufacturing enterprises start to address IoT cybersecurity, there are the needs they know they have - and then the ones of which they are completely unaware. Entrust's David Low shares what needs to be done and where best to begin.
They are high-profile, they have access to your company's most vital information, they rely on unsecured personal devices - and your cyber adversaries are targeting them. They are your board members, and Chris Pierson of BlackCloak has ideas on where and how you can better secure these leaders.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.