While more businesses are investing in security measures like multifactor authentication (MFA), employees still have poor password habits that weaken companies’ overall security posture, according to LastPass. Given that stolen and reused credentials are linked to 80 percent of hacking-related breaches, businesses must take more action to improve password and access security to make a…

When it comes to protecting the growing infrastructure at Polaris Alpha, CISO Eric Schlesinger believes in a people-and-processes approach over a tools-based approach. But five years from now, those priorities will likely shift. “I believe that machine learning and AI are the future to security operations. An ‘artificial analyst’ can replace one or two full-time…

“People make mistakes” is a common and relatable phrase, but it’s also a malicious one in the hands of cybercriminals, more of whom are exploiting simple human errors to launch successful attacks. The Information Security Forum (ISF) explored the topic in “Human-Centered Security: Addressing Psychological Vulnerabilities,” a new report published today. Human vulnerabilities, whether triggered…

Cybercriminals from around the world are actively discussing how to compromise connected devices, and how to leverage these devices for moneymaking schemes, according to Trend Micro. Trend Micro Research analyzed forums in the Russian, Portuguese, English, Arabic, and Spanish language-based underground markets to determine how cybercriminals are abusing and monetizing connected devices. The results reveal…

With the proliferation of SaaS solutions, API integrations and cloud computing, virtually everything in the modern enterprise is connected to untold number of outside entities. In fact, many business processes depend on this connectivity, even when doing so broadens the threat landscape and puts the organization at greater risk. This interconnectedness means that vendor vulnerabilities…

Cost of data breaches to surpass $5 trillion in 2024

A new report from Juniper Research found that the cost of data breaches will rise from $3 trillion each year to over $5 trillion in 2024, an average annual growth of 11%. This will primarily be driven by increasing fines for data breaches as regulation tightens, as well as a greater proportion of business lost…

Thefts from cryptocurrency exchanges continue despite increased security

Although exchanges, wallets and other cryptocurrency custody services are strengthening their defenses, attackers continue to innovate and outpace even the current state of the cybersecurity art, according to CipherTrace. Even Binance, the world’s number-one cryptocurrency exchange, lost tens of millions of crypto assets to a cyberattack perpetrated by sophisticated hackers using a lethal cocktail of…

In cybersecurity, deception is redundant if it cannot fulfill its critical aim – to misdirect, confuse, and lure attackers into traps and dead-ends. It is the art of tricking attackers into overextending and exposing themselves. To deceive attackers, an organization’s security team must see things from the adversary’s perspective. Several key components are required to…