New survey highlights the good and bad of cyber security’s global outlook

good-and-bad-of-cyber-security

The news these days is not good when you consider the state of cyber security around the world. Successful cyber attacks continue unabated while the security talent gap continues to widen. Throw into the mix a deluge of security data, difficulty securing containers, and other obstacles and you get mighty headwinds for IT security teams […]

Cyber reference architecture: A security backbone for the enterprise

backbone

At the heart of digital transformation is data. The importance of protecting this critical business asset is bringing cyber security into sharp focus in the boardroom as well as the data center. In the past, an enterprise’s cyber security team focused on IT security risks and threats, with little reference to business risks, objectives and […]

Healthcare survey finds abundance of medical device security overconfidence

overconfident-shadow

When facing a determined adversary, it’s one thing to be confident, it’s quite another to be overconfident. But that’s what a new survey of healthcare IT professionals and biomedical engineers found: an overabundance of confidence when it comes to connected medical device security. According to the 2018 Zingbox Second Annual Connected Medical Device Survey, respondents believe […]

Cyberattack biggest threat against U.S. financial system

stock-market-ticker-reflection-in-window

When asked during congressional testimony last week, Federal Reserve Chairman Jerome Powell, who was appearing in front of the House Committee on Financial Services, told lawmakers that the number one threat to the stability of the U.S. financial system is its ability to respond and mitigate a large-scale cyberattack against the financial system. “The clear […]

How application security testing needs to change in an agile, DevOps world

security-text-on-screen

In today’s dynamic cyber-attack landscape, a robust security strategy that looks at all attack surfaces is critical. Enterprises must tirelessly assess their current state of readiness and continually improve governance and processes to stay a step ahead of malicious actors. Applications are one of the preferred attack vectors with up to 90% of successful breaches […]

Enterprise security lessons for Meltdown and Spectre defence

computer-chip

Media panic was at a fever pitch last week with news of the Meltdown and Spectre cyber security flaws.  This is another high profile cyber security event that enterprise organisations will have to manage over the next several months. This is not, however, a repeat of the Wannacry and Not Petya incidents we saw during […]

Successfully defending against social engineering attacks

helmet-and-shield-armor

While it’s the technical aspects of cyberattacks that often make headlines — software exploits, worms, ransomware, and other forms of malware — it’s actually the subversion of people (end users) that make many, if not most attacks today, successful. All attacks eventually involve technical aspects, but it’s the trickery to get someone to click on […]

When it comes to digital security, millennials are slackers (but so are boomers)

unlocked-gate

Data from a survey of nearly 800 employed U.S. adults makes clear what enterprise IT security professionals have always known: Humans — of all ages! — are the single biggest security vulnerability in any enterprise. Conducted by payment technology solutions vendor First Data, the survey aimed to assess the cybersecurity awareness of different age groups among […]

Not all cyberattacks are over data theft

locked-gate

When executives consider the risk to their systems they often consider only the value of their data and that of their customers. Too rarely do they consider the intrinsic value of their raw computing power or how their computing systems could be used as part of a larger attack. Case in point, last week security […]

Exploring multiple-factor authentication in the consumer market

password authentication DXC Blogs

When Odysseus meets his family again after a decades-long journey, he must undergo many obstacles to prove himself the true ruler of Ithaca and legitimate husband of the queen, Penelope. New suitors and imposters are striving to take possession of the throne and its assets. But Odysseus, the architect of the Trojan horse, is aware of the […]