card__image

CISOs’ churn — CISOs as Chief Incident Scapegoats

Извините, этот текст доступен только на “en” и “ua”. CISO churn is a hidden cybersecurity threat. Major security initiatives or implementations can take longer than the residency of a single CISO.   The average tenure of a Chief Information Security Officer said to sit between 18 to 24 months. This is barely enough time to […]

card__image

Who’s Who In Ransomware

Извините, этот текст доступен только на “en” и “ua”. Ransomware is one of the most virulent and difficult security challenges organizations face. Cybersecurity experts predict ransomware will attack a business, consumer, or device every two seconds and will cost victims $265 billion annually by 2031.   WHAT IS RANSOMWARE?    Ransomware is a malware variant designed […]

card__image

Zero-Day Vulnerabilities: Cases about Consequences from 17 members of Forbes Technology Council

Извините, этот текст доступен только на “en” и “ua”. Zero-day vulnerabilities are flaws or weaknesses in software or an operating system of which the developer or vendor is unaware. Hackers discover these vulnerabilities first, giving developers and vendors “zero days” to release a patch. Zero-day vulnerabilities can cause not only immediate headaches for developers and […]

card__image

4 key mistakes CISO make at board meetings

Извините, этот текст доступен только на “en” и “ua”. Presenting to the board is a challenging opportunity. CIOs and CISOs would be wise to check their assumptions, know their audience, anticipate off-agenda questions, and steer clear of scare tactics.   It’s not uncommon for CIOs, CISOs, and sometimes their direct reports to be called on […]

card__image

Zero Trust Security: Benefits and Disadvantages

Извините, этот текст доступен только на “en” и “ua”. As threat actors become increasingly sophisticated, enterprises face a constant battle to keep their security policies and controls on pace with the evolution of threats. The attack surface continues to widen as the technology landscape becomes more complex, increasing the opportunities for hackers to cause widespread […]

card__image

The thin line between cybercrime and ethical hacking — the 15 types of hackers you need to know in 2023

Извините, этот текст доступен только на “en” и “ua”. Who’s trying to hack you? More people than you think. Today, everything from your phone to your crypto wallet to your smart fridge can be hacked. But are all hackers dangerous?   Black hat, green hat, blue hat — these are just a few types of […]

card__image

Nearly two thirds of CISOs have had to deal with the loss of sensitive data in the past 12 months — Proofpoint report

Извините, этот текст доступен только на “en” и “ua”. Cybersecurity company Proofpoint released its annual Voice of the CISO report, which explores key challenges, expectations, and priorities of chief information security officers (CISOs).   CISOs AGREE THAT THEIR ORGANIZATION IS AT RISK OF A MATERIAL CYBER ATTACK IN THE NEXT 12 MONTHS   According to […]

card__image

Более 40% ИТ-специалистов скрывают информацию о киберинцидентах

Поскольку фишинг и атаки программ-вымогателей набирают обороты, половина компаний столкнулись с тем или иным видом киберугроз за последний год.   Представьте, что в вашей компании произошла серьезная утечка данных, но вместо того, чтобы проинформировать соответствующие стороны и принять необходимые меры, вам приказали молчать!   Новое исследование, проведенное компанией по кибербезопасности Bitdefender, показало, что это реальная […]