Western Digital Hacked: ‘My Cloud’ Data Dead (Even Local Storage!)

Déjà Vu: Hack of WD systems leads to My Cloud service outage. Owners unable to access files ...
Security Boulevard

Prepare for the Security Resilience Onslaught

As we get ready for the upcoming RSA Conference, I gave some thought to what the industry marketing machinery will be hyping, and in looking at my inbox for clues, I saw ...
Security Boulevard

Show Me the Coverage: Ransomware Actors Demand Cyberinsurance Policies

The landscape of cybersecurity threats is continuously evolving, and ransomware attacks have emerged as a significant concern for organizations of all sizes. In a ransomware attack, cybercriminals encrypt the victim’s files, rendering ...
Security Boulevard

API Attacks Rise 400% in Last Six Months

Attacks on APIs continue to rise sharply. New findings from Salt Labs found a shocking 400% increase in unique API attackers in the last six months. Interestingly, the report also discovered that ...
Security Boulevard

Do You Need an Enterprise Browser to Secure Your Organization?

Web browsers are a useful mechanism for handling many functions and types of media in one place, but they also present security risks and are common targets for hackers. Browser security refers ...
Security Boulevard

Unpatched Vulnerabilities Hamper IT Security Efforts

Executive leadership teams are overlooking critical gaps in vulnerability management within organizations, despite a series of high-profile breaches, according to an Action1 survey of 804 IT professionals. The study revealed that, on ...
Security Boulevard

Business Email Compromise Threats Soar Past Phishing Risks

The risk of business email compromise (BEC) is increasing annually and is estimated to be twice as severe as the overall threat of phishing, according to an Osterman Research/IronScales survey of 249 ...
Security Boulevard

Data Encryption Methods and their Advantages and Disadvantages

Protecting data has become a critical part of every organization’s operation. However, choosing the best method of data encryption can be difficult with all the available options.   Here we discuss the ...