Help Net Security

Remote access security strategy under scrutiny as hybrid/remote working persists

While 83% of respondents say they are confident in their strategy for controlling access to apps for remote users, three-quarters are re-evaluating theirs in the wake of new ways of working.

Everyday cybersecurity practices inadequate among many online consumers

Findings from a new report show basic practices for securing data, protecting identity and sharing information are lacking despite increased threats and heightened concern over cybercrime.

Shift5 raises $20M to secure commercial and military transportation fleet systems

Shift5 raised $20 million in Series A funding led by 645 Ventures to provide enhanced cybersecurity and operational intelligence for today’s commercial fleet operators and military platforms.

Worldwide supply chains vulnerable as businesses lack visibility into suppliers

BlueVoyant released the findings of its survey on third-party cyber risk management, showing that 97% firms have been negatively impacted by a cybersecurity breach that occurred in their supply chain.

MITRE launches two organizations to protect critical infrastructure and clinical health data

MITRE has created two new organizations intended to help the company better focus on cybersecurity threats to critical infrastructure and new approaches to public health challenges.

IT leaders confident in their organization’s network security, IT managers have doubts

While IT leaders believe they have strong security practices in place, the continual search for additional network security capabilities suggests that the confidence may be tentative, as per a survey.

REvil/Sodinokibi accounting for 73% of ransomware detections in Q2 2021

The second quarter of 2021 was a vibrant quarter for ransomware, earning its place as a high-profile cyber agenda item for the U.S. administration following the Colonial Pipeline attack.

Strengthening firmware security with hardware RoT

With IT security and visibility efforts still largely focused higher in the stack at the application layer, bad actors are seeking to breach systems further down the stack at the firmware level.

Ransomware: Relationship breakdowns have never been so satisfying

The division of the roles and responsibilities within ransomware groups have historically appeared harmonious. However, in recent months we have seen a fracturing of these profitable relationships.

Finding the right mix: Leveraging policy and incentives to improve healthcare cybersecurity

Cybercriminals see a great opportunity in healthcare. They can get up to $1,000 per stolen medical record, making protected health information (PHI) more lucrative than credit card data.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags