Last year, 90% of businesses suffered identity-related incidents – attacks that take an average of 7 months (over 210 days!) to identify.
How many applications does your organization use? Systems? Networks? Now, how many devices try to access these assets daily? How about hourly? On average, a typical department has more than 200 applications in its tech stack. Multiply that by each department within the organization and that number ...
The Cybersecurity and Infrastructure Security Agency (CISA) is continuing its push to educate the public about the new phishing man-in-the-middle (Phishing MitM) attacks that have been spotted in the wild recently. These attacks are especially alarming due to the fact that they are successful even ...
Last week, the Department of Justice took unprecedented action to prevent widespread cyberattacks. What you need to know about the latest effort to thwart Russian aggression by acting on and publicizing intelligence before Moscow even acts.
We're all busy. We know we should be keeping a better eye on the latest developments in cybersecurity, but life and work can seem to get in the way.
Late Monday, the LAPSUS$ digital extortion gang used its Telegram channel to publish an increasingly shocking series of posts highlighting its latest exploits.
The recent SolarWinds breach rocked the cybersecurity world from top to bottom, leaving many questioning their own practices when it comes to securing data. In the weeks following the attack, it became evident that the traditional multi-factor authentication (MFA) and password measures that ...
As the year comes to a close, sometimes a fresh perspective is just what we need. In a recent article, Forbes Technology Council member (and amateur wine scholar) Darren Williams suggests evaluating new cybersecurity investments like you would an expensive wine: thinking about quality, complexity, ...
Another day, another near-catastrophic hack. This time, the target was a water treatment facility in Oldsmar, FL, a key part of the region’s infrastructure. While attempted attacks of the public infrastructure sector are nothing new, the methods by which this breach was conducted are raising alarms ...