Join the Conversation
Blog

When a cyberattacker tricks a user into clicking on a malicious link, the lionshare of the blame for the resulting data breach usually falls on that user’s shoulders. But that’s unfair. The reality is that no matter how well prepared your users are, one will inevitably make a mistake. That’s why Nyotron has invited me […]

Source: Getty Images The spread of the coronavirus is disrupting businesses and government agencies worldwide. But for cyber attackers, it’s business as usual. They see the global pandemic as just another opportunity to take advantage of people’s fears to distribute spam, spread disinformation and steal sensitive corporate data. And the fact that your organization’s security […]

The introduction to Osterman Research’s new report on cybersecurity threats to the healthcare industry strikes an ominous tone: “Hospitals account for one-third of data breaches in the United States… without significant improvements in cybersecurity readiness, healthcare providers will continue to suffer at the hands of cybercriminals.” Fortunately, the report also lays out the game plan […]

Source: iStockPhoto By Rene Kolga How difficult is the CISO’s job (and, for that matter, the jobs of all IT security pros)? The headline of this recent article by ZDNet’s Catalin Cimpanu says it all: “Average tenure of a CISO is just 26 months due to high stress and burnout”.  That’s the key finding of […]

By Rene Kolga The headline of this recent article in Sophos’ excellent Naked Security blog, “Nearly half of hospital Windows systems still vulnerable to RDP bugs”, is both alarming and run-of-the-mill. Alarming because about half of connected hospital devices remain vulnerable to the BlueKeep Windows flaw nearly a year after it was reported. But it’s […]

Source: TV.com By Ira Winkler, CISSP The long forgotten show CSI: Cyber deserves to be long forgotten – it was one of the worst shows on TV. It portrayed ridiculous scenarios where highly skilled criminals could turn computers into death traps. The plot of one of the absurd episodes (a very low bar) was that a […]

As you set your RSA schedule, you won’t have trouble blocking off time for work-related commitments. There will be keynotes and panel discussions to attend, vendors to visit, and meetings disguised as breakfast, lunch and dinner parties. The challenge will be finding time for yourself to take a breath and relax. We’ve got your covered […]

By Ira Winkler, CISSP There’s an insidious connotation to the term “insider threat”. It sounds like a spy novel villain who infiltrates a business or government agency under the guise of a faithful employee, steals sensitive data, and escapes unnoticed. But more often than not, the person responsible for a data breach is an innocent […]

Sophos has officially halted all support, maintenance and updates for all of its Invincea products, including the browser isolation (container) designed to protect you from unknown malware. Don’t panic if your organization is an Invincea customer – your product license remains active until the end of its current term, albeit without any support or updates […]

We’re co-hosting a webinar today (Wed. 1/29 at 3 pm EST) with Michael Osterman, President of Osterman Research, that will focus on the public sector threat landscape.  Webinar: Cybersecurity Challenges and Solutions for State & Local Governments Wednesday, January 29th | Noon PDT (3:00 PM EDT) Register to attend on BrightTALK Osterman Research is preparing […]

Subscribe to our blog

Follow us on Social Media