85% of breaches involve the human element

The Verizon report examines more breaches than ever before, and sheds light on how the most common forms of cyber attacks affected the international security landscape during the global pandemic. This year’s report saw 5,258 breaches from 83 contributors across the globe, a third more breaches analyzed than last year. With an unprecedented number of […]

Continue Reading

Most organizations fail to fix cloud misconfiguration issues in a timely manner

A significant majority of companies that move to multi-cloud environments are not properly configuring their cloud-based services, Aqua Security reveals. According to the report findings, these misconfigurations, for example leaving bucket or blog storage open, can open companies up to critical security breaches. Reflecting the overwhelming amount of configurations practitioners must address, even when companies […]

Continue Reading

How prepared is the intelligence community to tackle possible threats?

Human psychology is complex. It’s a dynamic and sometimes contradictory system. Compounding this problem is the rapid progress of technology and social media, toppling boundaries like never before. In this complicated and fast-evolving setting, how prepared is the intelligence community to identify, assess, and mitigate possible threats before they become realities? Fortunately, the other side […]

Continue Reading

Maximizing a hybrid cloud approach with colocation

As a multi-tenant cloud environment, the public cloud offers companies with vast amounts of data a highly affordable option. However, it also presents a number of limitations including reliability challenges, a lack of control and transparency, and information security issues. First, uptime reliability can be a major issue for public cloud architectures. Popular cloud platforms […]

Continue Reading

When exploit code precedes a patch, attackers gain a massive head start

Cybersecurity researchers that publicize exploit code used in cyberattacks are giving a clear and unequivocal advantage to attackers, new research conducted by Kenna Security and Cyentia Institute has found. “This data-driven research, built over the course of several years, should remove any doubt,” said Ed Bellis, CTO of Kenna Security. “Practices that have long been […]

Continue Reading