threat landscape


Educational institution networks continue to be a favorite playground for cybercriminals. Because of the age and interests of the majority of educational users, these networks tend to incorporate cutting edge technologies and strategies. [Read More]
by RSS Tony Giandomenico  |  Jan 31, 2018  |  Filed in: Industry Trends, Security Research
A recent Cyber Threat Alliance blog by Michael Daniel discussed the evolution of ransomware and the IoT. Read this post to learn more. [Read More]
by RSS Jeannette Jarvis  |  Jan 15, 2018  |  Filed in: Industry Trends, Security Research
2017 was another landmark year for cybersecurity. In reviewing our quarterly Threat Landscape reports, it is clear that 2017 has been notable primarily for three things: the rapid digital transformation and expansion of the potential attack surface, the increasing sophistication of cyber attacks, and a lapse in basic cybersecurity hygiene, largely being driven by digital transformation coupled with the growing cybersecurity skills gap. [Read More]
by RSS John Maddison  |  Dec 29, 2017  |  Filed in: Industry Trends
To mitigate the cyber risks associated with Internet of Medical Things (IoMT) devices connecting to healthcare networks, security controls must be put in place to ensure that one compromised medical device does not lead to the compromise of the entire network and the loss of valuable patient data. [Read More]
by RSS Rajoo Nagar  |  Dec 28, 2017  |  Filed in: Industry Trends
Partners: Cybersecurity must always be a critical element of your customers’ innovations to ensure that changes in enterprise technology do not leave the organization vulnerable to attacks. However, this is easier said than done. [Read More]
by RSS Jon Bove  |  Dec 27, 2017  |  Filed in: Business and Technology
The proliferation of online devices accessing personal and financial information, the adoption of virtualized and multi-cloud environments, and the growing connection of everything – from armies of IoT devices and critical infrastructure in cars, homes, offices, and industry, to the rise of smart cities – have combined to create new destructive opportunities for cybercriminals. [Read More]
by RSS John Maddison  |  Dec 14, 2017  |  Filed in: Industry Trends
The growing need for on-demand network and compute resources is outpacing available internal resources, even in private cloud environments, and is driving organizations to the public cloud. According to IDC, 75% of organizations are currently implementing or considering the implementation of public cloud resources, and they predict that 50% of enterprise workloads will migrate to the public cloud by 2018.  This new shared infrastructure approach comes with significant security challenges, including creating and maintaining a consistent... [Read More]
by RSS John Maddison  |  Nov 08, 2017  |  Filed in: Industry Trends
It seems like CSOs are always seeing flashing red lights on their security dashboards these days, warning them of another breach or risk of compromise. There are so many security events happening day in and day out that it’s difficult to decide what’s the top priority. That’s a good metaphor for the state of cybersecurity efforts across the globe – we’re in a constant state of flashing red. That is, if we even see the attack coming, which we increasingly don’t. Recent breach disclosures, once again, show that... [Read More]
by RSS Aamir Lakhani  |  Nov 06, 2017  |  Filed in: Industry Trends
Today, the billions of online IoT devices present an even more daunting challenge because they generally don't receive the level of control, visibility, and protection that traditional systems receive. Coupled with widespread automation-based attacks, the potential for damage is even greater. Recent developments, outlined below, reveal why it's time to take IoT security seriously. [Read More]
by RSS Derek Manky  |  Oct 30, 2017  |  Filed in: Industry Trends
This change is also causing OT and IT to fight over the control of digital ground. While OT is growing, it is primarily growing into the spaces usually controlled by IT as it is being bolted onto the same networks that phones, routers and laptops touch. This is creating a whole range of security challenges that neither group has ever had to deal with in the past and affects the delivery of applications and information that reaches all the way into the executive suite. [Read More]
by RSS James Cabe  |  Oct 12, 2017  |  Filed in: Industry Trends