Cybersecurity skills gap worsens, security teams are understaffed

As emerging technology and threat landscapes experience rapid transformation, the skillsets need to change as well. 80 percent of 336 IT security professionals Dimensional Research polled on behalf of Tripwire believe it’s becoming more difficult to find skilled cybersecurity professionals, and nearly all respondents (93 percent) say the skills required to be a great security…

IoT devices using CoAP increasingly used in DDoS attacks

IoT devices in synchronised attacks on targets represent a growing part of global Distributed Denial of Service (DDoS) weapon arsenals. There is a significant potential for attackers to use an IoT-related protocol, the Constrained Application Protocol (CoAP), deployed on IoT devices to marshal attacks. The A10 Networks report on the state of DDoS weapons in…

Cloud business initiatives accelerating faster than security teams’ ability to secure them

The speed of cloud business initiatives is hampering organizations’ ability to secure and manage hybrid environments, with security personnel often not included. The 2019 State of Hybrid Cloud Security survey by FireMon revealed 60% of respondents either agreed or strongly agreed that this was happening in their organizations. Additional key findings include: Only 56% of…

Social media-enabled cybercrime is generating $3.25 billion a year

Social media-enabled cybercrime is generating at least $3.25B in global revenue annually, according to an extensive six-month academic study undertaken by Dr. Mike McGuire, Senior Lecturer in Criminology at the University of Surrey. Key insights One in five organizations have been infected with malware distributed via social media Reports of cybercrime involving social media grew…

Increasing security measures are driving cybercriminals to alter their techniques

Increased security measures and awareness are driving cybercriminals to alter their techniques in search of a better return on investment (ROI). As a result, two major shifts occured, including decreased reliance on malware and a decline in ransomware, as criminals increased their use of other cybercrime techniques with the potential for greater ROI, according to…

Healthcare industry: Key trends and cybersecurity challenges

Each year, Bitglass analyzes data from the U.S. Department of Health and Human Services’ “Wall of Shame,” a database containing information about breaches of protected health information (PHI) that affected 500 or more individuals. In 2019’s report, the latest data is compared to that of previous years, revealing key trends and cybersecurity challenges facing the…

Most IoT devices are being compromised by exploiting rudimentary vulnerabilities

Cybercriminals are looking for ways to use trusted devices to gain control of Internet of Things (IoT) devices via password cracking and exploiting other vulnerabilities, such as through the exploitation via voice assistants, according to the latest Mobile Threat Report unveiled by McAfee. With over 25 million voice assistants in use across the world, these…