Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Human Firewall: Your Guide to a Security Culture

It’s easy to think that securing the systems and data of an organization is primarily a technological undertaking. The human element of your cybersecurity strategy is usually seen as a weakness—and not without reason. According to estimates, up to 95% of breaches involve a human element. There’s only so much that technology can do to safeguard against human error and neglect of cybersecurity principles.
Featured Post

What are the top cybersecurity trends to look out for in 2024?

As 2024 fast approaches, organisations are looking back on the past year to try and gain some insight into what the next 12 months could hold. This past year has been particularly interesting in the world of cyber security, with ransomware and data breaches dominating the headlines, the rise to prominence of AI strengthening cybercrime's arsenal, and the shift of focus to cyber resilience causing businesses to question what comes next for the industry.

Insider Threat Risk Assessment: Definition, Benefits, and Best Practices

Insider threats are expensive. The total average annual cost of an insider threat rose to $15.4 million according to the 2022 Cost Of Insider Threats Global Report by the Ponemon Institute . Companies spend a fortune on lawsuits, fines for non-compliance with security requirements, and mitigating the consequences of cybersecurity incidents — not to mention the negative impact of such incidents on an organization’s reputation.

OT Security Is Different, Isn't IT?

In 2010 suddenly everyone was talking about OT security. Stuxnet had arrived. In 2021, The Colonial Pipeline hack increased the attention on the security of operational technology again. Since then, we have encountered numerous incidents, and the risk of breaches within the OT environment has increased significantly. But why is OT security a separate ‘thing’ in security. What is the difference between OT and IT in the cyber security field?

Don't Let the Cyber Grinch Ruin your Winter Break: Project Cybersafe Schools protects small school districts in the US

As the last school bell rings before winter break, one thing school districts should keep in mind is that during the winter break, schools can become particularly vulnerable to cyberattacks as the reduced staff presence and extended downtime create an environment conducive to security lapses. Criminal actors make their move when organizations are most vulnerable: on weekends and holiday breaks.

A Look at the Nim-based Campaign Using Microsoft Word Docs to Impersonate the Nepali Government

Threat actors often employ stealthy attack techniques to elude detection and stay under the defender’s radar. One way they do so is by using uncommon programming languages to develop malware. Using an uncommon programming language to develop malware provides several benefits, including: Netskope recently analyzed a malicious backdoor written in Nim, which is a relatively new programming language.

Information Security Policy: Must-Have Elements and Tips

Organizations often create multiple IT policies for a variety of needs: disaster recovery, data classification, data privacy, risk assessment, risk management and so on. These documents are usually interconnected and provide a framework for the company to set values to guide decision-making and responses. Organizations also need an information security policy (InfoSec policy). It provides controls and procedures that help ensure that employees will work with IT assets appropriately.

Trustwave 2024 Predictions Part 2: Cyber Talent Shortage and the US Federal Government

There is every reason to believe that 2024 will be an interesting year in the cybersecurity space, making it difficult to foresee what might transpire. However, Trustwave’s leadership is up to the task. In Trustwave 2024 Predictions Part 1, we looked at what might hold in store for the upcoming US election cycle and AI.