New research from Metomic finds that 40 percent of Google Drives hold sensitive data that could put an organization at risk of a data breach or cybersecurity attack.
The research scanned around 6.5 million Google Drive files and also shows that 34.2 percent of all the files scanned were shared with external contacts (email addresses outside of the company's domain) and more than 350,000 files (0.5 percent) had been shared publicly, giving access to anyone who had the document link.
Ransomware attacks are influencing price inflation, according to a new UK survey by Censuswide, commissioned by Veeam Software.
The findings show that large organizations are having to increase costs to customers by an average of 17 percent following an attack. Nearly a quarter of companies (22 percent) say they increased prices by 21-30 percent, while six percent increased prices by 31-40 percent.
A new survey of 500 full-time security decision-makers and practitioners finds that 84 percent indicate their organization combines security and data operations into a single analytics tool.
However, the study from Observe shows more than half of the security relevant data that goes into observability systems needs to be transformed before it can be used.
New research into the manufacturing threat landscape from Trustwave finds that just 19 percent of manufacturing industry leaders are confident in their cyber defense mechanisms.
The research documents the attack flow utilized by threat groups, exposing their tactics, techniques, and procedures. From email-borne malware to the exploitation of SMB and DCOM protocols for lateral movement, these persistent threats pose significant risks to the manufacturing sector.
As cyberattacks continue to evolve so defenses need to change to keep up. In many cases that means adopting AI.
Enterprise networking and security company Cisco is the latest to embrace this with launch of Cisco AI Assistant for Security.
According to one analyst estimate, the market for network automation tools will grow nearly 23 percent annually from 2022-2030.
While many IT professionals are familiar with automation of business processes, they are likely less familiar with its applications in network operations (NetOps) and security. As automation technology is maturing, organizations are using network automation solutions to transform their core workflows, including troubleshooting, change management and network security, for more efficient and effective network operations.
The use of automated security technology is growing rapidly according to the latest edition of the annual Building Security In Maturity Model (BSIMM) report from Synopsys.
The research also shows that there's a move towards a 'shift everywhere' culture -- which means performing security tests throughout the entire software development life cycle -- across more organizations.
The demands of daily lives increasingly mean that we want to be connected wherever we are. Add in the shift to hybrid working and we’re likely to want to be in touch with the office all the time too.
That makes the lure of free public Wi-Fi, whether it's in a coffee shop, a hotel or an airport, hard to resist, especially if you have a limited data allowance on your mobile contract. But of course using public networks always comes with a side order of added risk.
Starting from today, a new Google inactive account policy comes into effect which means that accounts that haven't been active for two years will be deleted.
So, what counts as 'activity'? Google provides a helpful list:
Recent cyber attacks have seen not just the usual monetary motives but also the rise of espionage attempts with attacks on government officials.
So how can organizations, both public and private sector, protect their most valuable assets? We spoke to Glenn Luft, VP of engineering at Archive360, to find out.
The cyber extortion threat landscape continues to evolve quickly and the past 12 months have seen the number of victims globally increasing by 46 percent, marking the highest numbers ever recorded.
A new report from Orange Cyberdefense shows large enterprises were the victim in the majority of attacks (40 percent), with those employing more than 10,000 people seeing a steady increase.
New research from Dig reveals that cloud assets like Amazon S3 buckets and Azure Storage accounts are being left open to ransomware attacks thanks to poor configuration.
It shows that only 31 percent of S3 buckets have versioning enabled, an essential for data recovery, while just two-thirds of sensitive buckets have logging enabled, a prerequisite for detection. In addition 72 percent of remote CMK buckets are not actively monitored.
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in.
This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems -- and explains why doing so is more important now than ever.
The healthcare sector is particularly attractive to cybercriminals due to the amount of personal data held and the critical nature of many systems.
We spoke to Shankar Somasundaram, CEO of IoT risk management platform Asimily, to discuss healthcare systems and the challenges involved in securing them.
While 92 percent of IT business leaders believe they've made the right security investments and 88 percent say they meet all compliance requirements, half still worry about their company's security.
New research by Propeller Insights for AppDirect shows top areas of concern include cybersecurity risk (58 percent), information security risk (53 percent) and compliance risk (39 percent).