In attempting to fortify the enterprise’s cyber assets, we have turned much of our attention to human error. After all, the vast majority of hackers rely upon their exploitation of employees to break through corporate defenses, anticipating that these employees will fail to “see” a threat that is hidden inside a seemingly harmless web link, email or on-screen message. Organizational leaders are aware of this, and are growing increasingly concerned – for good reason. At … More
The post How to remove human error from the cyber risk equation appeared first on Help Net Security.
Mozilla has released Firefox 70.0, which delivers performance and power consumption improvements, helpful browser features, new options for developers and, most prominently, new security and privacy protections. Privacy protections In January 2019, Mozilla published its official anti-tracking policy, which singled out cookie-based and URL parameter-based cross-site tracking and tracking via unintended identification techniques as practices that should be blocked by default by web browsers. With that in mind, the organization has, slowly but surely, been … More
IoT/ICS networks and unmanaged devices are soft targets for adversaries, increasing the risk of costly downtime, catastrophic safety and environmental incidents, and theft of sensitive intellectual property. Some of the top CyberX report findings noted that these networks have outdated operating systems (71 percent of sites), use unencrypted passwords (64 percent) and lack automatic antivirus updates (66 percent). Energy utilities and oil and gas firms, which are generally subject to stricter regulations, fared better than … More
The post How to reduce the risk posed by vulnerabilities in IoT/ICS networks? appeared first on Help Net Security.
Data security is a legitimate worry for today’s consumers around the world, Ping Identity survey reveals. Approximately one half (49%) of respondents report that they are more concerned about protecting their personal information than they were one year ago. This is evident by the lack of confidence consumers around the world have in a brand’s ability to safeguard personal information. Ping Identity surveyed a representative sample of 4,017 adults in the United States, United Kingdom, … More
More than half of all security findings (56%) are fixed, but a focus on fixing new findings while neglecting aging flaws leads to increasing security debt, according to Veracode research. After analyzing more than 85,000 applications across more than 2,300 companies worldwide, the research found that fixing vulnerabilities has become just as much a part of the development process as improving functionality, suggesting developers are shifting their mindset to view the security of their code … More
The post Chance that flaws will ever be dealt with diminishes the longer they stick around appeared first on Help Net Security.
Top ten strategic technology trends that organizations need to explore in 2020 have been identified. Gartner defines a strategic technology trend as one with substantial disruptive potential that is beginning to break out of an emerging state into broader impact and use, or which is rapidly growing with a high degree of volatility reaching tipping points over the next five years. “People-centric smart spaces are the structure used to organize and evaluate the primary impact … More
The post Analysts explore the top strategic technology trends for 2020 appeared first on Help Net Security.