Anomali announced the results of a survey conducted by The Harris Poll. It includes responses from more than 2,000 American adults and reveals how Americans believe business and government organizations should respond to ransomware attacks as well as their opinions on cybersecurity in general. This survey suggests that Americans believe government and businesses alike should…

While digital transformation helps companies work smarter, there is a risk that the ongoing digitization may unlock a host of security vulnerabilities that can cost companies money, time, intellectual property, and customer trust, according to a Canon survey. All organizations surveyed across a range of verticals experienced an alarming amount of cyber threats over the…

On a global scale, cybersecurity is suffering from a severe shortage of experts. What is to be done? Organizations, government, academia and professional associations need to work together to develop a sustainable cyber skills strategy. To date, strategic thinking has largely focused on what to defend and how to defend, but less on who is…

Thefts from cryptocurrency exchanges continue despite increased security

Although exchanges, wallets and other cryptocurrency custody services are strengthening their defenses, attackers continue to innovate and outpace even the current state of the cybersecurity art, according to CipherTrace. Even Binance, the world’s number-one cryptocurrency exchange, lost tens of millions of crypto assets to a cyberattack perpetrated by sophisticated hackers using a lethal cocktail of…

AI vs. AI: Cybersecurity battle royale

David and Goliath. The Invasion of Normandy. No matter the generation, we all know some of the storied battles that have withstood the test of time. In cyberspace, however, there’s a fierce battle brewing surrounding artificial intelligence. With AI projected to become a $190 billion industry by 2025 (according to Markets and Markets), it is…

Cyber security provider F-Secure is advising organizations using F5 Networks’ BIG-IP load balancer, which is popular amongst governments, banks, and other large corporations, to address security issues in some common configurations of the product. Adversaries can exploit these insecurely configured load balancers to penetrate networks and perform a wide variety of attacks against organizations, or…

The majority of organizations don’t know if the security tools they deploy are working, and are not confident they can avoid data breaches, according to AttackIQ. AttackIQ released the report based on Ponemon Institute research evaluating the efficacy of enterprise security strategies. Ponemon surveyed 577 IT and IT security practitioners in the United States who…