This edition of the ISMG Security Report analyzes the latest ransomware trends from the European Union Agency for Cybersecurity, findings from the first-ever Cyber Safety Review Board on the Log4j incident, and how security and privacy leaders are harmonizing new U.S. privacy laws.
Britain's Conservative Party is holding a leadership contest, with the winner set to become the country's next prime minister. But the balloting process has been delayed after the National Cyber Security Center warned that hackers could abuse a process allowing members to change their online vote.
Thales plans to enter the customer identity and access management market through its purchase of an emerging European CIAM player. The French firm plans to capitalize on OneWelcome's strong product by extending its footprint beyond Europe and into North America and Asia-Pacific.
Email continues to be the No. 1 source of cyberattacks and a significant point of risk for most organizations. Yet other
collaboration tools (e.g. Slack, Microsoft Teams, and even Zoom) are also emerging as points of risk.
Download the eBook to learn more about:
Configuration & Administration
Organizations that are relying on cloud-based email providers to secure their email systems and data should strongly consider adding a secure email gateway. Too many organizations are confusing the existence of security features with the efficacy of those features.
While moving enterprise email to the cloud has...
The UK Cyber Security Council is responsible for running the cybersecurity industry’s Cyber Certified Professional scheme. The council seeks to set the standard for chartered cybersecurity professionals and align with qualifications and certifications in the sector, says council CEO Simon Hepburn.
DevOps is a movement that enables collaboration throughout the entire software delivery lifecycle by uniting two teams: development and operations. The benefits of DevOps can extend to security by embracing modern secure DevOps practices.
The security team’s way forward is to unify with DevOps in its four key...
When it comes to protecting applications and APIs, the rules have changed. Many organizations still use security tools designed for an earlier era.
Download our eBook to discover the new rules for web app and API security and why:
Tools must fight intent, not specific threats
There is no security without...
Yet another ransomware-wielding group of criminals has hit an organization in the health sector. This time, it's cybercrime group RansomEXX, which has been trumpeting an attack against the Scottish Association for Mental Health. The crime gang says it has stolen more than 12GB of data from SAMH.
Applying cloud access security broker’s three functionalities - API-level integration with managed device transfer for visibility, in-line CASB for proxy and other devices, and its control over cloud and other access points - helps provide better control and the ability to protect and secure user access, says Thomas...
Could the internet of things be made more secure? A draft law in Britain would impose stronger cybersecurity regulations for manufacturers, importers and distributors of smartphones, TVs, toys and other "connected" digital devices, backed by the threat of fines of up to $13 million for noncompliance.
While cloud adoption opens up opportunities for enterprises for better operational efficiency, cost-effectiveness, ease of use and scale with agility, it also increases vulnerabilities. Collaboration with hyperscalers is now an important part of most enterprise cloud journeys. However, with the growing migration of...
Because a relatively small number of individuals provide the vast majority of services and infrastructure that power cybercrime, they remain top targets for arrest - or at least disruption - by law enforcement authorities, says cybercrime expert Alan Woodward. But of course, geopolitics sometimes gets in the way.
Phishing, ransomware and unauthorized access remain the leading causes of personal data breaches as well as violations of data protection rules, Britain's privacy watchdog reports. The U.K. government has also been caught out by breaches and leaks involving military secrets and CCTV footage from a government building.
O365 has become the standard productivity platform, with the largest market share of users leveraging Microsoft's email, voice, file sharing applications, and all collaboration and productivity tools everyone uses and loves!
This movement is definitely fueled by the move to the Cloud and SaaS application consumption,...