Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Can Ekran System Protect You against Infected USB Devices?

While it’s difficult to imagine our business lives without USB devices, each USB connection can pose a serious risk to an organization’s security. Attackers can infect USB devices with malware that attacks your corporate system once a user connects an infected device. Such attacks can damage your infrastructure or machines and result in the theft or compromise of sensitive data.

Ransomware Gangs are "Big Game Hunting" as Victim Org Sizes and Ransom Payments Continue to Rise

Midsize and enterprise organizations take notice: the average and median amount of a ransom payment and the median size of the victim organization are on the rise. If you’re at all concerned about ransomware (and you should be), the latest details from ransomware response vendor Coveware’s latest Quarterly Ransomware Report should have your attention.

78% of Ransomware Victim Organizations Encounter Additional Threats-Turned-Extortions

New data sheds light on how likely your organization will succumb to a ransomware attack, whether you can recover your data, and what’s inhibiting a proper security posture. You have a solid grasp on what your organization’s cybersecurity stance does and does not include. But is it enough to stop today’s ransomware attacks?

FTC Warns of MetaMask and PayPal Phishing Campaigns

The US Federal Trade Commission has issued an alert warning of phishing campaigns that are impersonating PayPal and the MetaMask cryptowallet. “If you got an email that seems to be from MetaMask or PayPal, stop,” the FTC says. “They’re phishing scams. The MetaMask fake says your cryptocurrency wallet is blocked. And, if you don’t act fast, click a link, and update your wallet, they say your crypto will be lost.

The State of Organizational Cyber Defenses Impacts Cyber Insurance Availability, Cost, and Terms

A new report highlights the direct connection between how strong your organization’s security stance is and how easy it is to obtain cyber insurance. Like any insurance policy, the insurer has figured out the indicators of risk and includes a form of assessment when considering issuing you a policy. When you want to obtain car insurance, they ask about your driving record, where you live, and even what your credit score is – all to determine how much of a risk you are.

Together, We Can Foster Positive Mental Health in Cybersecurity

May is Mental Health Awareness Month, and I want to take this time to reflect on something we don’t often talk openly about in the security community: mental health. Nearly half of CISOs turn over every two years. Almost 100% of CISOs report feeling stressed at work, with about two-thirds saying stress issues are compromising their ability to protect their organization, and 100% saying they felt they needed more resources to adequately cope with current IT and security challenges.

Reduced Attack Surface: How to Reduce Your Attack Surface (and Why It Matters)

Data breaches are an ever-present risk for organizations of all sizes — and the larger the attack surface, the greater the risk. There is growing awareness of the need to manage the attack surface, and reducing the attack surface is an essential component. However, many companies lack full visibility into their real attack surface, making reduction challenging.

Certera EV Code Signing Certificate for Highest Software Legitimacy and Integrity

Certera is the modern and affordable certificate authority offering code signing and SSL certificates. It is sub CA is globally trusted CA named Sectigo. Digital certificates called EV (Extended Validation) code signing certificates are used to encrypt and sign code, scripts, and software programs. Users may have a high level of confidence thanks to these certificates that the code being signed is genuine, hasn’t been tampered with, and originates from a reliable source.

Device Authority and Entrust Further Demonstrate Their Partnership Potential to Provide Security to the Supply Chain

Identified as leaders in IoT (Internet of Things) Device Identity Lifecycle Management by ABI Research, and leaders in IoT IAM according to Quadrant, Device Authority and Entrust have worked together to integrate Device Authority’s KeyScaler® IoT IAM (Identity and Access Management) platform with PKI (Public Key Infrastructure) services from Entrust, extending the existing collaboration for Hardware Security Module (HSM) services, to provide device trust, data trust and automation at IoT sca