Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Ransomware Recovery Costs Have Doubled for State and Local Governments

Thirty-four percent of state and local government entities were hit by ransomware in 2024, a new report from Sophos has found. While this is a decrease compared to the attack rate in 2023, the mean cost of recovery for these entities has more than doubled to $2.83 million. Seventy-two percent of ransom demands made to state and local government organizations in 2024 were for $1 million or more, with 37% of demands for $5 million or more.

The Vision Leading to Check Point's Acquisition of Cyberint

The cyber threat landscape is complex and includes many vectors of attack. Organizations face critical security challenges every day, such as stolen employee credentials, fake websites, and social media impersonation. Taking a binary point of view, those threats can be divided into two simplistic dimensions: external and internal. According to the 2023 Verizon DBIR, the external threats consume 83% of the total threats.

Understanding Data Exfiltration Prevention

In an economy where securing data can mean the difference between success and failure, implementing proven data exfiltration prevention strategies is more critical than ever. According to a study conducted by IBM, a data breach can cost global organizations an average of nearly $5 million per incident. In addition to the financial ramifications, data theft can lead to lower customer trust, a loss of future revenue, and even potential lawsuits.

CTEM step-by-step guide | Stage one: Scoping

Welcome to our blog series on Continuous Threat Exposure Management (CTEM), where we dig into the five essential stages of implementing a robust CTEM program. Coined by Gartner in 2022, CTEM is a powerful process that can help continuously manage cyber hygiene and risk across your online environment. It’s also a lot to think about when you’re starting out, so it helps to break things down. Our series begins with the crucial first stage: Scoping.

The Problem with Disjointed Cloud Migration Journeys

Organizations start their cloud migration journey with high hopes for more speed, agility, and innovation. But often, these hopes fall short. Instead of achieving a seamless, cloud-powered enterprise, companies end up with fragmented cloud projects, data security risks, and unpredictable spending. This scattered approach can stall cloud initiatives and prevent organizations from fully benefiting from the cloud. Let’s take a look at some of the impacts and risks.

EP 60 - Going Viral: Security Insights from TikTok's Former Global CSO

In this episode of the Trust Issues podcast, Roland Cloutier, who served as TikTok’s Global Chief Security Officer (CSO) from April 2020 to September 2022, joins host David Puner for a discussion that covers his extensive experience in the field of security. He previously held similar roles at ADP and EMC and is now a partner at the Business Protection Group.

The wider impact of the CrowdStrike outage

On Friday 19 July 2024, CrowdStrike suffered a serious outage in which over 8.5 million computers were taken offline. Whilst it may have first appeared to be a cyber-attack, it was actually a faulty update to CrowdStrike Falcon which led to computers crashing to a blue screen on boot. Many organisations were affected, and in some cases were unable to access computer systems for multiple hours.

CVE-2024-40766: Critical Improper Access Control Vulnerability Impacting SonicOS

On August 22, 2024, SonicWall published a security advisory regarding a critical improper access control vulnerability in several SonicWall Firewall models. This vulnerability, identified as CVE-2024-40766, is a flaw in SonicOS, the operating system that powers these firewalls. CVE-2024-40766 allows a remote, unauthenticated attacker to gain unauthorized access to resources and/or cause the firewall to crash under specific conditions.

The Ultimate Guide to Waterproof Phones

Waterproof phones have become essential for many users, offering peace of mind against accidental spills, splashes, and even submersion. Whether you're an outdoor enthusiast, a frequent traveler, or simply someone who values durability, understanding what makes a phone waterproof and why it's beneficial can help you make an informed decision when purchasing your next device. In this guide, we'll explore the technology behind waterproof phones, their advantages, and the best models available in 2024.

How to Connect to Dropbox with an FTP Client

Most of the users would like to use Dropbox for managing their files via FTP since they are used to the interface and the options of the FTP clients. But unfortunately, the it is not natively supported by Dropbox and therefore, a solution is required. In this article, I'll guide you through the process and make sure you'll be able to link Dropbox with your client as smooth as butter, with a focus on Commander One - the best tool for the job.