What does cybersecurity tool sprawl look like today?

DevSecOps

Cybersecurity has become an increasingly important concern in the business world. After all, reports have found that 41 percent of businesses fell victim to a cyberattack in 2023. As the technology cyber attackers use to conduct their nefarious activities becomes more complex, so is the technology that IT professionals use to protect organizations and their data. However, with this also comes a unique new challenge: tool sprawl.

Tool sprawl occurs when a company utilizes an unnecessary number of IT tools, usually because it implements separate solutions for each use case. Although it may seem most efficient to address needs as they arise or present themselves, adopting a comprehensive approach is often more efficient -- particularly in a case where proactivity is vital, such as cybersecurity.

Continue reading

Businesses losing revenue to bot attacks

bot or social bot and algorithms, program code

A new report reveals that 98 percent of organizations attacked by bots in the past year have lost revenue as a result.

The latest State of Bot Mitigation Report from Kasada, based on a survey of over 220 US tech professionals, also shows that despite investing heavily in bot defenses, most solutions are proving to be ineffective. Just one in five say that after initial deployment their bot mitigation solution retained effectiveness for more than 12 months.

Continue reading

Cyberattacks on critical infrastructure increase 30 percent

refinery industry

Between January 2023 and January this year, critical infrastructure worldwide saw over 420 million attacks -- equivalent to 13 attacks per second -- marking a 30 percent increase from 2022.

A new report from security awareness specialist KnowBe4 shows cyberattacks targeting critical infrastructure have surged globally, posing significant risks to national security and economic stability.

Continue reading

89 percent of organizations expect to increase data security budgets

computer piggy bank and cash

A new report from Normalyze shows that 89 percent of organizations expect to see a significant or moderate increase in data security budgets over the next 12 months, driven by the escalating threat landscape and stringent regulatory requirements like GDPR and HIPAA.

The report, based on research by Omdia, finds top security priorities include reducing the opportunity for threats to infiltrate data stores (59 percent), improving data security posture (53 percent), and demonstrating ROI through improved reporting and business communication (42 percent).

Continue reading

Vulnerabilities rise in first half of 2024

Vulnerability security

So far this year, vulnerabilities have risen by 11 percent and the availability of publicly known exploits has increased by six percent.

The latest Cyber Threat Intelligence Index from Flashpoint reveals 17,518 newly disclosed vulnerabilities in the first half of the year. Also, over 45 percent of all vulnerabilities disclosed in H1 2024 are rated high to critical in CVSSv3.

Continue reading

How IT leaders can bring their organizations into the next generation of cyber learning and training [Q&A]

Virtual training

The IT world has always been a fast moving one and that means skills need to be kept up to date if you're not going to fall behind.

We spoke to Brett Shively, CEO of ACI Learning a provider of IT, cybersecurity and audit training for organizations around the world, about the importance of training and how a personalized approach can pay off.

Continue reading

Save $39.99! Get 'Cybersecurity Strategies and Best Practices' for FREE

Cybersecurity-Strategies-and-Best-Practices

If you are a cybersecurity professional looking for practical and actionable guidance to strengthen your organization’s security, then this is the book for you. Cybersecurity Strategies and Best Practices is a comprehensive guide that offers pragmatic insights through real-world case studies.

Written by a cybersecurity expert with extensive experience in advising global organizations, this guide will help you align security measures with business objectives while tackling the ever-changing threat landscape.

Continue reading

File sharing phishing attacks increase 350 percent

File sharing mobile

Although it dates back to the very early days of the internet, email remains a vital communications channel for businesses. But it also continues to present security challenges.

A new report from Abnormal Security reveals a 350 percent year-on-year growth in file-sharing phishing attacks, while business email compromise attacks (BEC) have grown over 50 percent from the second half of 2023 to the first half of 2024.

Continue reading

Business security: Advancements in on-premise and online tech solutions

Security

Biometric access control, video surveillance, and intrusion alarms enhance on-site protection by promptly addressing unauthorized access -- these advanced systems monitor who enters your facilities and allow for real-time responses to incidents.

Meanwhile, cybersecurity remains a key aspect of business demanding great attention. The emergence of generative AI and automation technologies can evaluate threats and make decisions significantly faster, heightening the effect of your defense mechanisms.

Continue reading

Manufacturing and industrial sectors most targeted by attackers

Industrial fail

Manufacturing and industrial products remain the most targeted sectors by cyber threat actors in the first half of 2024, with 377 confirmed reports of ransomware and database leak hits in the first half of the year.

A new report from managed detection and response specialist Critical Start is based on analysis of 3,438 high and critical alerts generated by 20 supported Endpoint Detection and Response (EDR) solutions, as well as 4,602 reports detailing ransomware and database leak activities across 24 industries in 126 countries.

Continue reading

Ransomware productivity shows signs of leveling off

Ransomware money

According to a new report, ransomware productivity has shown signs of leveling off in 2024, however, the frequency of attacks and ransom payments collected remains higher in the first half of 2024 compared to the same periods in 2022 and 2023.

The report from WithSecure suggests law enforcement actions, notably the take down of the Lockbit ransomware group in February 2024, have played a critical role in disrupting major ransomware operations.

Continue reading

GenAI adoption surges amid concerns about security

AI security attack

Although enterprises are adopting GenAI in a big way, only five percent of the 1,000 cybersecurity experts responding to a new survey have confidence in the security measures protecting their GenAI applications even as 90 percent are actively using or exploring its use.

The research from Lakera shows attack methods specific to GenAI, or prompt attacks, are easily used by anyone to manipulate the applications, gain unauthorized access, steal confidential data and take unauthorized actions.

Continue reading

Real-time hybrid data access is key to AI success

Data blockchain

A new report from data lakehouse company Starburst highlights the critical role of real-time hybrid data access and robust security in successful AI implementations.

Based on a survey of 300 IT professionals from diverse industries in the United States and Western Europe, carried out by TheCUBE Research, the report shows 90 percent of respondents believe their data management practices are either somewhat or very aligned with their AI innovation goals, highlighting the critical role of coherent data strategies.

Continue reading

Ransomware attacks rise over 60 percent

Ransomware Malware Cyber Attack

In the last year, the US has experienced a dramatic 63 percent increase in ransomware attacks, with the UK seeing an even greater rise of 67 percent.

The latest State of Ransomware report from Malwarebytes shows the share of attacks carried out by gangs outside the top 15 increased from 25 percent to 31 percent, indicating that ransomware is becoming more accessible to a broader range of cybercriminals.

Continue reading

Over half of enterprises suffer data breaches in non-production environments

Enterprise data breach

A new study shows 91 percent of organizations are concerned about the expanded exposure footprint across non-production environments (including software development, testing, and data analytics).

Once a production dataset is copied many times over into non-production environments, more workers have access to it and the data is no longer subject to the same strict security controls.

Continue reading

Load More Articles