Tag: threat
The latest OT/IoT security report from Nozomi Networks shows that wiper malware and IoT botnets dominate threats to industrial control systems. Researchers have observed the robust usage of wiper malware, and seen the emergence of an Industroyer variant, dubbed Industroyer2,…
Microsoft has launched two new security products, bolstering the capabilities of Microsoft Defender. The company says that the aim of the two tools is to help organizations lock down their infrastructure and reduce their overall attack surface. The tools, Microsoft…
A new survey reveals that 60 percent of respondents believe their overall security strategy does not keep pace with the threat landscape, and that they are either lagging behind (20 percent), treading water (13 percent), or merely running to keep…
The threat landscape facing enterprises is changing constantly. In recent months, major vulnerabilities like Log4j and malware-based threats have demonstrated the need for organizations to move quickly in order to defend themselves. Is the best way to stay on top…
In the past security has been something that was added only at the end of the development process. But as release cycles have accelerated this is no longer a viable approach. DevSecOps (development, security and operations) is all about automating…
New research from HP Wolf Security finds that 80 percent of IT leaders are concerned about their capacity to respond to firmware attacks. The study shows that 67 percent of IT leaders say protecting against, detecting, and recovering from firmware…
The age of what might be called the hobbyist hacker is long gone, replaced by a much more serious trend towards organized crime and nation states being behind hacking and cyberattacks. In an era where data can be weaponized, both…
According to a new report 85 percent of IT security professionals have experienced preventable business impacts resulting from insufficient response procedures, while 97 percent say that more accurate alerting would increase their confidence in automating threat response actions. The State…
Everyone is striving to make their systems more secure and in many cases that means adopting encryption in order to protect data. But the use of encrypted traffic over networks presents a headache for security teams as malicious content can…
Ransomware, software supply chain attacks, data breaches, and more have become an almost daily occurrence in an increasingly challenging threat landscape. Automated threat detection company Blumira has released a new report based on its security detections which reveals that identity-based…