Businesses Now Spend a Third of Their Cybersecurity Budget on SOC

Businesses Now Spend a Third of Their Cybersecurity Budget on SOC

by Filip Truta, from Business Insights , on 07.07.2020

Organizations with a dedicated security operations center (SOC) know how much it helps combating cyber threats. 72% of IT security practitioners in organizations with a SOC categorize the unit as “essential” or “very important” to their organization’s cybersecurity strategy. However, 60% of SOC team members are considering changing careers or quitting due to stress. read more

Many CIOs Believe Expired TLS Certificates Could Affect Their Business

Many CIOs Believe Expired TLS Certificates Could Affect Their Business

by Silviu Stahie, from Business Insights , on 07.07.2020

Most Chief Information Officers (CIO) are worried about the security risks associated with the proliferation of TLS machine identities, which is aggravated by the fact that many of them don’t have an accurate account of the number of certificates deployed in their infrastructure. read more

Why Vulnerable IoT Is a Double-Sided Problem for ISPs and Their Customers

Why Vulnerable IoT Is a Double-Sided Problem for ISPs and Their Customers

by Silviu Stahie, from Business Insights , on 03.07.2020

A scan of the Japanese Internet infrastructure showed how many devices could be compromised with common user names and passwords, and ISPs helped the authorities make that determination. But ISPs also seemed to lack the tools to make those determinations by themselves, in a way that secures their networks and customers at the same time. read more

CISA and FBI Issue Advisory on Dealing with Tor Malicious Internet Traffic

CISA and FBI Issue Advisory on Dealing with Tor Malicious Internet Traffic

by Silviu Stahie, from Business Insights , on 03.07.2020

The Cybersecurity Security and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued an advisory for companies regarding the detection and mitigation of malicious traffic coming from Tor (The Onion Router.) read more

10 Stats About SOC Performance, Practices, and Analyst Attitudes in 2020

10 Stats About SOC Performance, Practices, and Analyst Attitudes in 2020

by Business Insights , on 02.07.2020

Recent studies show that the modern SOC has evolved to become the lynchpin for most enterprise security strategies. Organizations spend a significant chunk of their security budget on SOC operations and many depend upon the SOC to help them detect and hunt for threats, respond to incidents, and maintain visibility into the organization's cyber risk posture. However, SOC effectiveness still varies greatly from organization to organization. read more

Remote Workers Encounter 8 Risky URLs per Day, New Research Shows

Remote Workers Encounter 8 Risky URLs per Day, New Research Shows

by Filip Truta, from Business Insights , on 02.07.2020

Given enough time, employees – especially those working remotely – will click on a link to a potentially dangerous website. But how much time? According to recent data, less than an hour. read more

DDoS Attacks Increase Almost 300% in Just One Year, Study Shows

DDoS Attacks Increase Almost 300% in Just One Year, Study Shows

by Silviu Stahie, from Business Insights , on 02.07.2020

DDoS attacks are on the rise at a time of the year that's usually a lot less uneventful, according to a report from Nexusguard that reveals a 278% increase in DDoS attacks compared to Q1 2019. read more

IoT Devices Carry Risk Across All Verticals, Study Finds

IoT Devices Carry Risk Across All Verticals, Study Finds

by Silviu STAHIE, from IoT Security Insights , on 07.07.2020

A new survey aims to offer a clearer image of the Internet of things (IoT) and the distribution of vulnerabilities and other issues across all major verticals, identifying the most problematic IoT devices active today. IoT devices are ubiquitous in today’s world, even where we don’t see them. In many cases, the IoT hardware suffers ... The post IoT Devices Carry Risk Across All Verticals, Study Finds appeared first on Bitdefender. read more

Are Companies Ready for the Risks of IoT?

Are Companies Ready for the Risks of IoT?

by Business Insights , on 04.07.2020

The Internet of Things (IoT) and Industrial IoT (IIoT) are beginning to see some real momentum, particularly in industries such as manufacturing, healthcare, and retail. More and more devices, equipment, vehicles, buildings, and other objects are being equipped with sensors and connected, enabling the sharing of data that provides useful insights for businesses. read more

Smart Assistants Are Falsely Triggered All the Time

Smart Assistants Are Falsely Triggered All the Time

by Silviu STAHIE, from IoT Security Insights , on 04.07.2020

Voice assistants should only listen to their owners and ignore the rest, but new research shows that they can respond to false triggers much more than we imagine, and it’s usually the result of forgiving programming. Most people can point to situations when their phone or smart assistant woke up, seemingly triggered by someone talking ... The post Smart Assistants Are Falsely Triggered All the Time appeared first on Bitdefender. read more

Next >>