Behavioral analytics and why it's important to threat detection and response [Q&A]


Traditional rule-based security techniques centered on malware signatures and perimeter protection are increasingly unable to cope with the latest, more sophisticated threats.
Taking a more behavior-based approach to spotting unusual or risky activity offers a solution, but what is required to make it work? We spoke to Sanjay Raja, VP of product marketing and solutions at cybersecurity specialist Gurucul, to find out.
Cybersecurity firm Trellix releases report on critical infrastructure providers' readiness for attacks


Cyberattacks are something every organization fears. Perhaps those who should be most concerned, and which should scare us most, are the ones that control vital infrastructure -- nuclear power plants (recall Stuxnet in Iran?), banks, telephone carriers, healthcare and power grids.
Today, security firm Trellix releases its latest report on the current state of affairs in the industry and, as expected, the news isn’t all rainbows and unicorns.
Cybersecurity takes a back seat to other digital projects


A new study reveals that 79 percent of cybersecurity professionals think that their organization prioritized maintaining business operations over ensuring robust cybersecurity in the last 12 months.
The CyberArk 2022 Identity Security Threat Landscape Report also points up how the rise of human and machine identities -- often running into the hundreds of thousands per organization -- has driven a build-up of identity-related cybersecurity 'debt', exposing organizations to greater risk.
Lessons the military can bring to cybersecurity [Q&A]


The ongoing struggle between good and bad actors in the cyber world has often been compared to a battle or warfare. More recently the threat of nation state attacks on critical infrastructure has led to more actual military interest in the cyber arena, as we've seen in Ukraine.
The Israel Defense Force's 8200 unit is often referred to the SEALs or SAS of cyber military units and its veterans are driving many of Israel's tech start ups.
94 percent of critical assets can be compromised within four steps of a breach


A new study from Israel-based XM Cyber, based on findings from nearly two million endpoints, files, folders and cloud resources throughout 2021, shows 94 percent of critical assets can be compromised within just four steps of the initial breach point.
The research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-premise, multi-cloud and hybrid environments, and developed tips for thwarting them.
Get 'Privacy, Regulations, and Cybersecurity' ($27 value) FREE for a limited time


Privacy, Regulations, and Cybersecurity: The Essential Business Guide is your guide to understanding what "privacy" really means in a corporate environment: how privacy is different from cybersecurity, why privacy is essential for your business, and how to build privacy protections into your overall cybersecurity plan.
First, author Chris Moschovitis walks you through our evolving definitions of privacy, from the ancient world all the way to the General Law on Data Protection (GDPR). He then explains -- in friendly, accessible language -- how to orient your preexisting cybersecurity program toward privacy, and how to make sure your systems are compliant with current regulations.
The challenge of hiring cyber talent in the Great Resignation [Q&A]


Whether it's been triggered by the pandemic or other factors, the Great Resignation has led to new problems for businesses when it comes to finding and retaining staff.
This has been a particular problem in the tech sector where employees tend to be quite mobile anyway. We spoke to Amar Kanagaraj, founder and CEO of Protecto, to find out how businesses can meet the challenges of hiring tech talent.
F-Secure creates new corporate security brand


Cybersecurity company F-Secure is rebranding its corporate security business under the new name WithSecure and with a snazzy new logo, above.
Previously known as F-Secure Business, WithSecure will focus on corporate security products and solutions, while consumer security products and services remain available under the existing F-Secure name.
Ukraine conflict puts organizations’ cyber-resilience to the test


Russia’s invasion of Ukraine has provoked a massive rally of hackers to join both sides of the conflict and take up arms in the cyber-war. As has been the case in cyberattacks of recent years, the consequences of this will affect organizations way beyond the initial intended target. For example, in June 2017 French company Saint-Gobain was forced to halt its operations as a result of the NotPetya attack, a Russian cyberattack targeting Ukraine that resulted in over €80 million of losses in company revenue.
As a result of a sharp increase of cyber-attacks since the beginning of the conflict, from DDoS, new data wipers, phishing campaigns and malware, organizations worldwide should take immediate action to improve their cyber-resilience and limit the damages that any spillover could have on their business.
Don't panic! Knowledge, skill and judgment are key to cybersecurity responses


Humans are often the weak link in the cybersecurity chain, but it's human capabilities that are also key to dealing with attacks and their aftermath, according to a new report from Immersive Labs.
The inaugural Cyber Workforce Benchmark report analyzed cyber knowledge, skills and judgment from over half a million exercises and simulations run by more than 2,100 organizations over the last 18 months.
UK cybersecurity sector sees record revenue


Revenue generated by cybersecurity firms in the UK rose by 14 percent to £10.1 billion ($13.7 billion) last year according to the latest Annual Cyber Sector Report from the Department for Culture Media and Sport (DCMS).
The report, which tracks the growth and performance of the UK's cyber security industry, reveals the sector contributed around £5.3 billion to the UK economy in 2021, rising by a third on the previous year from £4 billion -- the largest increase since the report began in 2018.
The rise of the 'super malicious' insider


Humans have always been a weak link in the cybersecurity chain and a new report from DTEX Systems provides evidence that the sudden shift to remote working has directly contributed to an escalation in psychosocial human behaviors that create organizational risk.
In particular it notes the rise of 'super malicious' insiders, who accounted for 32 percent of malicious insider incidents investigated by the DTEX Insider Intelligence and Investigations (I3) team in 2021.
Cybersecurity and the art of persuasion [Q&A]


Despite the introduction of systems based on AI and other technologies, cybersecurity remains an ultimately human problem.
It's not just a problem for IT teams either, to keep the enterprise safe security needs to be taken seriously throughout the organisation. It's the role of the CISO to ensure this but it can be a challenge to implement.
Cybersecurity and the generation gap


As baby boomers reach retirement age, younger people are taking their place in the workforce. But does this lead to a loss of skills that aren't being replaced?
A new study commissioned by Appgate looks at how generational differences impact cybersecurity teams and the benefits to be gained from having an inter-generational mix of staff.
Half of global ransomware attacks target the US


Last year 48 percent of ransomware attacks were directed at targets in the United States, with industrial and energy, retail, and finance businesses among the most threatened.
Research from AtlasVPN finds that out of 2,845 witnessed ransomware attacks worldwide in 2021 1,352 were launched against targets in the US. Meanwhile one in five attacks were against European countries with France suffering 146 attacks, the UK 139 and Germany 115.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.