Tag: threat

Industrial systems under threat from wipers and IoT botnets

The latest OT/IoT security report from Nozomi Networks shows that wiper malware and IoT botnets dominate threats to industrial control systems. Researchers have observed the robust usage of wiper malware, and seen the emergence of an Industroyer variant, dubbed Industroyer2,…

Continue Reading Industrial systems under threat from wipers and IoT botnets

Microsoft beefs up Defender security with new Threat Intelligence and External Attack Surface Management tools

Microsoft has launched two new security products, bolstering the capabilities of Microsoft Defender. The company says that the aim of the two tools is to help organizations lock down their infrastructure and reduce their overall attack surface. The tools, Microsoft…

Continue Reading Microsoft beefs up Defender security with new Threat Intelligence and External Attack Surface Management tools

60 percent of security pros say their strategy doesn’t keep up with the threat landscape

A new survey reveals that 60 percent of respondents believe their overall security strategy does not keep pace with the threat landscape, and that they are either lagging behind (20 percent), treading water (13 percent), or merely running to keep…

Continue Reading 60 percent of security pros say their strategy doesn’t keep up with the threat landscape

Do we need a cyber NATO to address the changing threat landscape? [Q&A]

The threat landscape facing enterprises is changing constantly. In recent months, major vulnerabilities like Log4j and malware-based threats have demonstrated the need for organizations to move quickly in order to defend themselves. Is the best way to stay on top…

Continue Reading Do we need a cyber NATO to address the changing threat landscape? [Q&A]

DevSecOps and the importance of threat modeling [Q&A]

In the past security has been something that was added only at the end of the development process. But as release cycles have accelerated this is no longer a viable approach. DevSecOps (development, security and operations) is all about automating…

Continue Reading DevSecOps and the importance of threat modeling [Q&A]

Threat of firmware attacks is a growing concern for business

New research from HP Wolf Security finds that 80 percent of IT leaders are concerned about their capacity to respond to firmware attacks. The study shows that 67 percent of IT leaders say protecting against, detecting, and recovering from firmware…

Continue Reading Threat of firmware attacks is a growing concern for business

Why we need to take the threat of cyberwarfare seriously [Q&A]

The age of what might be called the hobbyist hacker is long gone, replaced by a much more serious trend towards organized crime and nation states being behind hacking and cyberattacks. In an era where data can be weaponized, both…

Continue Reading Why we need to take the threat of cyberwarfare seriously [Q&A]

Poor alerts hamper effective automation of threat detection

According to a new report 85 percent of IT security professionals have experienced preventable business impacts resulting from insufficient response procedures, while 97 percent say that more accurate alerting would increase their confidence in automating threat response actions. The State…

Continue Reading Poor alerts hamper effective automation of threat detection

The role of encrypted traffic analysis for threat detection [Q&A]

Everyone is striving to make their systems more secure and in many cases that means adopting encryption in order to protect data. But the use of encrypted traffic over networks presents a headache for security teams as malicious content can…

Continue Reading The role of encrypted traffic analysis for threat detection [Q&A]

Identity-based attacks are top threat to businesses

Ransomware, software supply chain attacks, data breaches, and more have become an almost daily occurrence in an increasingly challenging threat landscape. Automated threat detection company Blumira has released a new report based on its security detections which reveals that identity-based…

Continue Reading Identity-based attacks are top threat to businesses