Log4j flaw: Nearly half of corporate networks have been targeted by attackers trying to use this vulnerability
Cybersecurity researchers warn on the growing pace of scans and attempted attacks looking to exploit the Java logging library security flaw. The number of attacks aiming to take advantage of...
CIOs to play key role in US cybersecurity strategy
Former US CISA director Chris Krebs outlined the intent of the Biden administration’s cybersecurity executive order — and stressed the importance of a robust response from CIOs across all sectors....
Ransomware: Cyber criminals are still exploiting these old vulnerabilities, so patch now
Years-old security vulnerabilities remain a common attack method for ransomware attacks because organizations aren’t applying the patches to fix them. Some of the cybersecurity vulnerabilities most commonly exploited by cybercriminals...
Security blind spots persist as companies cross-breed security with devops
As devops matures into devsecops, cultural obstacles continue to exert drag. Devops has become common in software-development organizations around the world, but many companies are still struggling with cultural issues that...
Ransomware: Now attackers are exploiting Windows PrintNightmare vulnerabilities
Cyber-criminal groups including Vice Society and Magniber have been spotted using vulnerabilities in Windows Print Spooler to infect victims with ransomware. Cyber criminals are exploiting Windows PrintNightmare vulnerabilities in their...
Healthcare CIOs fear (and fend off) ransomware threats amid pandemic
Hospital IT leaders are fending off more hackers looking to capitalize on the COVID-19 crisis for financial gain. Mt. San Rafael Hospital thwarted a ransomware attack on one of its...
Top IT spending priorities for 2021
IT budget priorities reflect the pandemic’s ongoing effects, with IT leaders earmarking more for improving remote work, expanding digital initiatives, and enhancing customer experience. The pandemic will continue to influence...
WFH security lessons from the pandemic
The unplanned worldwide experiment in remote work has been a trial by fire for security pros. Here’s how IT teams have protected work-from-home employees, and what needs to be done...
Ransomware: How to make sure backups are ready for a real attack
Avoid paying off ransomware attackers by following these steps to ensure backups can restore infected systems. The best way to avoid paying ransom to attackers who have infected your systems...
4 trends fueling hybrid-work strategies in 2021
In 2021, IT leaders will equip reconfigured corporate offices with hoteling and contract-tracing tools and automate more business processes while extending their cybersecurity coverage. If 2020 taught tech leaders anything...