Tag Archives: Computer security

04Feb/22

80% of Critical Infrastructure Organizations Experienced Ransomware Attacks Last Year

Claroty, the security company for cyber-physical systems (CPS) across industrial, healthcare, and enterprise environments, today released a new report, revealing that 80% of critical infrastructure organizations experienced a ransomware attack in the last year, with an equal number reporting that their security budgets have risen since 2020. Titled “The Global State of Industrial Cybersecurity 2021: Resilience Amid Disruption,” the report is based on an independent global survey of 1,100 information technology (IT) and operational technology (OT) professionals who work in critical infrastructure sectors, exploring how they have dealt with the significant challenges in 2021, their levels of resiliency, and priorities moving forward. Continue reading

06Dec/21
Art of Control

Android Enterprise: The Art of Control

The Art of Control is now available to watch on demand. Catch up on what you missed!
Highlights from this session with featured guests from Walmart, the FBI and Schneider Electric include:

  • Discover how Walmart empowers its associates with productivity, privacy and security. Find out why the world’s largest employer deployed 740,000 Samsung devices with the Android work profile.
  • Explore how the FBI elevates their security with Android Enterprise. Deep dive on the platform security controls and ease of management that enables a federal government agency’s mobile workers.
  • Hear how Schneider Electric masters the Art of Control. Learn how a multi-national company manages their devices and keeps their data and employees secure.

WATCH ON DEMAND »

12Sep/21

53% of European companies blame cyberattacks on unknown assets

A new poll by MIT Technology Review Insights, in association with Palo Alto Networks, underscores the cybersecurity struggles countries in Europe, the Middle East, and Africa have with outdated software and tools. When the pandemic forced employers to support remote work, these infrastructure security shortfalls became all too apparent. Read more

02May/21

Coalfire Launches Risk-Based Attack Surface Management Solution

With its recent acquisition of Neuralys, a cloud-based penetration testing management platform, today Coalfire launched its Attack Surface Management (ASM) solution to enhance the company’s growing offensive security portfolio. ASM complements the company’s 20-year risk management heritage by automating asset discovery, testing, remediation, and reporting across today’s expanding attack surfaces. Continue reading

23Apr/21

Use of Stalkerware and Spyware Apps Increase by 93% since Lockdown Began in the UK

Avast (LSE: AVST), a global leader in digital security and privacy products, reveals there has been a 93% increase in the use of spyware and stalkerware apps1 in the UK since lockdown measures were first introduced. In the past year, Avast has protected over 4,585 users in the UK from apps capable of spying, and 165,049 users across the globe. Continue reading

16Mar/21

New SonicWall 2020 Research Shows Cyber Arms Race at Tipping Point

The pandemic’s work-from-home reality resulted in an unprecedented change for organizations as they fought to defend exponentially greater attack surfaces from cybercriminals armed with powerful cloud-based tools, cloud storage and endless targets. As working environments evolved, so did the methods of threat actors and other motivated perpetrators, as detailed in the latest 2021 SonicWall Cyber Threat Report. Continue reading

16Feb/21

Garry Kasparov at IMPROVATE Israel-UAE-Eastern Europe Cybersecurity spoke about Chess, Artificial intelligence, his role in the series The Queen’s Gambit

With the accelerated transition to remote work, cloud use, and the use of online payments, the number and cost of cyber-attacks on individuals, private companies and states has dramatically increased. The IMPROVATE Israel-UAE-Eastern Europe Cybersecurity Conference presented groundbreaking Israeli technologies in the field of cybersecurity, and also defense against circulation of fake news. Continue reading