Business security


277 articles

Business Security

Vulnerabilities in business VPNs under the spotlight

Vulnerabilities in business VPNs under the spotlight

Business Security

Vulnerabilities in business VPNs under the spotlight

As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk

Márk Szabó28 Feb 2024


ESET Research, Ukraine Crisis – Digital Security Resource Center

Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war

Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war

ESET Research, Ukraine Crisis – Digital Security Resource Center

Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war

A mix of PSYOPs, espionage and … fake Canadian pharmacies!

Matthieu Faou21 Feb 2024


Video, Ransomware

Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

Video, Ransomware

Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

Called a "watershed year for ransomware", 2023 marked a reversal from the decline in ransomware payments observed in the previous year

Editor09 Feb 2024


Business Security

The buck stops here: Why the stakes are high for CISOs

The buck stops here: Why the stakes are high for CISOs

Business Security

The buck stops here: Why the stakes are high for CISOs

Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses?

Phil Muncaster08 Feb 2024


Business Security

Left to their own devices: Security for employees using personal devices for work

Left to their own devices: Security for employees using personal devices for work

Business Security

Left to their own devices: Security for employees using personal devices for work

As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD security won’t cut it

Christian Ali Bravo06 Feb 2024


Digital Security, Business Security

Cyber: The Swiss army knife of tradecraft

Cyber: The Swiss army knife of tradecraft

Digital Security, Business Security

Cyber: The Swiss army knife of tradecraft

In today’s digitally interconnected world, advanced cyber capabilities have become an exceptionally potent and versatile tool of tradecraft for nation-states and criminals alike

Andy Garth29 Jan 2024


Business Security

Assessing and mitigating supply chain cybersecurity risks

Assessing and mitigating supply chain cybersecurity risks

Business Security

Assessing and mitigating supply chain cybersecurity risks

Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management

Phil Muncaster25 Jan 2024


Business Security

The 7 deadly cloud security sins – and how SMBs can do things better

The 7 deadly cloud security sins – and how SMBs can do things better

Business Security

The 7 deadly cloud security sins – and how SMBs can do things better

By eliminating these mistakes and blind spots, your organization can take massive strides towards optimizing its use of cloud without exposing itself to cyber-risk

Phil Muncaster16 Jan 2024


Business Security

A peek behind the curtain: How are sock puppet accounts used in OSINT?

A peek behind the curtain: How are sock puppet accounts used in OSINT?

Business Security

A peek behind the curtain: How are sock puppet accounts used in OSINT?

How wearing a ‘sock puppet’ can aid the collection of open source intelligence while insulating the ‘puppeteer’ from risks

Mario Micucci11 Jan 2024