The Cloud Threats Memo is a weekly series from Paolo Passeri, digging into a recent cloud threat and highlighting how Netskope can best help mitigate it.
In light of the current pandemic, our healthcare industry has been challenged like never before. Healthcare workers heroically stepped up to the plate, caring for those in need, while the industry itself digitally transformed to keep up with the influx of patient data and virtual wellness appointments.
The Lookout Threat Intelligence team has discovered two novel Android surveillanceware – Hornbill and SunBird.
Organizations are overwhelmed by the choice of cyber security tools in the market. They need to balance prioritizing and remediating vulnerabilities with managing their secure configurations. What’s more, many organizations are using hybrid clouds where they need to protect assets that are hosted both on premises and in the cloud. This complexity requires a thoughtful approach to cyber security.
The construction industry is not unfamiliar with disruption. In 2008, the Construction Engineering Index plunged 68 percent. Firms that survived the financial crisis that year faced severe margin pressure – dropping from 5 percent in 2007 to 1 percent by 2010. The industry had to act fast and looked for more innovative ways to cut costs and boost profitability. The industry had to act fast and looked for more innovative ways to cut costs and boost profitability.
Logs are critical for detecting and investigating security issues. They also provide essential visibility into business operating environments. Many organizations, when they are small and just starting out, can get away with using a local log server and storage to collect data. Almost all security teams start off with this kind of on-premises logging approach. Most teams use an open-source, homegrown solution for this type of short-term, small-scale log analytics.
Selecting the perfect IAST solution for your organization’s needs can be difficult. Learn about the eight must-have features of any good IAST tool. Interactive application security testing (IAST) has quickly gained momentum in the application security (AppSec) space. According to Gartner, there was a 40% increase in inquiry volume around IAST in 2019. Why is IAST one of the fastest-growing AppSec tools?
The importance of the security of the Department of Defense’s (DoD’s) networks is no secret (well, of course a lot of it is secret!). This is evidenced by the Department’s IT/cybersecurity budget request that annually tops $40 billion dollars. Last year’s IT and Cyberspace Activities Budget Overview perhaps said it best.
More than 80% of small and medium-sized businesses (SMBs) view IT security as a top business concern, and 75% of corporate executives rank cybersecurity enhancements as a pressing issue in the year ahead. For many, this means adapting to a long-term remote workforce by empowering employees to be productive and secure from any location. In response to last year’s pandemic, 85% of CISOs reported sacrificing cybersecurity to enable remote work. Now, it’s time to revive those capabilities.