Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Protect Your Company's Social Media Passwords From Cybercriminals

All businesses, regardless of size or industry, are potential targets for cybercriminals. As businesses become more aware of the importance of password security in preventing data breaches, they focus on the most obvious areas of weakness, such as employee email accounts and network passwords. However, social media passwords present unique security challenges that organizations may be ill-prepared to handle.

Secure the Lifeblood of the American Economy

Small and medium-sized businesses account for 4.17 percent of private sector employees and almost half of the United States’ gross domestic product , yet—due to limited finances, resources, and staff—many have difficulties when it comes to supply chain management. Geopolitics, inflation, and worker shortages are just a few variables that can impact supply chains; 86% of SMB supply chains have already been or expect to be impacted by Russia’s war in Ukraine.

EP 25 - Cisco CX Cloud CISO on the Language of Risk

We all accept a certain degree of risk in our lives. So, to varying degrees, we’re all operating – to use cybersecurity parlance – with an assume breach mindset. Meaning, we accept that attacks are inevitable and, as such, we focus time and effort on protecting the assets that matter most. In short, we buckle up for safety.

Cloudflare One named in Gartner Magic Quadrant for Security Service Edge

Gartner has recognized Cloudflare in the 2023 “Gartner® Magic Quadrant™ for Security Service Edge (SSE)” report for its ability to execute and completeness of vision. We are excited to share that the Cloudflare Zero Trust solution, part of our Cloudflare One platform, is one of only ten vendors recognized in the report. Of the 10 companies named to this year’s Gartner® Magic Quadrant™ report, Cloudflare is the only new vendor addition.

Key Takeaways from S&P Global Market Intelligence Discovery Report: The Impact of Continuous Security Validation

In late 2022, SafeBreach commissioned S&P Global Market Intelligence to conduct a research project surveying 400 highly qualified security practitioners across the United States and Europe. The goal was to understand respondents’ biggest security challenges, the level of adoption and maturity of the continuous security validation (CSV) tools they use to address those challenges, and the business outcomes they achieved.

Threat-Informed Cybersecurity: Are You Ready and Resilient? Part I

Long popular in the military, “readiness and resiliency” is a staple of cybersecurity, too. It makes sense. Both institutions value (1) being alert to threats and risks while (2) recognizing that the types of threats and risks themselves are less important than the reaction to them. But how companies PERCEIVE risk is often very different from how they TAKE ON risks. Over 90% of my penetration tests have concluded with successful entry into “secure” environments.

5 Strategies for Cutting the Costs of Insider Threats

The costs associated with insider threats continued to rise in 2022. This is bad news for organizations that are already under financial pressure from the uncertainty of the economy. As interest rates continue to climb and customers become more conservative about how they spend, the last thing that any organization needs is to be putting out fires from security incidents coming from arsonists inside their own house.

Protegrity Announces Borderless Data Solution to Enable Secure and Compliant Cross-Border Data Flows

With this new solution, global enterprises can navigate increasingly regulated, fragmented data privacy landscape by enabling data transfers across geographies and lines of business.