IT disaster recovery, cloud computing and information security news
- Details
Chris Harris explains what double extortion ransomware is, explores the growing challenge that it poses for businesses, and looks at prevention tactics that can be implemented as part of a zero trust approach to cyber security.
- Details
APIs have become a mission critical tool for integrating enterprise applications; but this has been identified by cybercriminals as well as enterprise architects. Liad Bokovsky looks at the emerging issue of API security and resilience.
- Details
Beyond Identity and various industry partners have launched a new category of zero trust technology: Zero Trust Authentication (ZTA).
- Details
CISA, the US Cybersecurity and Infrastructure Security Agency, has announcing that it has created the Ransomware Vulnerability Warning Pilot (RVWP). This is in response to a requirement of The Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA), which President Biden signed into law in March 2022.
- Details
The BCI has published its latest Cyber Resilience Report, sponsored by Daisy. The report examines the disruption levels and cyber resilience arrangements across organizations, as well as the reporting and role of senior executives in the development of cyber resilience strategies.
- Details
Proofpoint, Inc., has released its ninth annual State of the Phish report, revealing attackers are using both emerging and tried-and-tested tactics to compromise organizations.
- Details
CISA has released a new document to help organizations improve monitoring and hardening of networks. This describes the lessons learned from a red team assessment of a large critical infrastructure organization with a mature cyber posture.
- Details
As part of the Post-Quantum Telco Network Taskforce, GSMA, an industry organization, has published the ‘Post Quantum Telco Network Impact Assessment’.
- Details
SonicWall has published the 2023 SonicWall Cyber Threat Report. The bi-annual report details an increasingly diversified cyber attack landscape amid shifting threat actor strategies.
- Report confirms that cyber risks are high on the c-suite's agenda
- Three tips to stay on top of the endpoint security burden
- Four specific cyber threats related to blockchain use and how to manage them
- Three quarters of vulnerabilities currently exploited by ransomware groups were discovered before 2020