Remove vulnerabilities-threats firms-still-struggle-to-prioritize-security-vulnerabilities
article thumbnail

Cloud Credential Stealing Campaign Targets AWS, Azure, GCP

SecureWorld News

A recent report from cybersecurity firm SentinelOne sheds light on a concerning trend in the cyber threat landscape: the expansion of a cloud credential stealing campaign targeting Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).

article thumbnail

Creating a Vulnerability Management Program – Patching: Take the Panic out of Patching by Managing CVE Threat Overload

NopSec

Focused on making a profit, the leadership doesn’t worry excessively about cybersecurity or vulnerability prioritization. And while cybercrime is ramping up, the number of common vulnerabilities and exposures identified each year has been declining — from 6,610 in 2006 to 4,155 in 2011. And truthfully, I’m not sure we are.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

VPNs begin to lose their relevance, even as they remain difficult to shed

SC Magazine

A recent report from Zscaler found that VPNs are still overwhelmingly popular: 93% of companies surveyed reported that they have used them in some capacity. Virtual private networks have been around for decades, but the past year forced many organizations to expand their use to keep up with growing telework trends.

VPN 128
article thumbnail

Ransomware, supply chain attacks compel health care organizations to act

SC Magazine

In the wake of the SolarWinds incident, an increasing number of health care institutions are embarking on threat-hunting missions to seek and destroy exploitable vulnerabilities. In the meantime, however, Tony Cook, head of threat intelligence on GuidePoint Security’s consulting team, sees another approach growing in popularity.

article thumbnail

Strong medical device security awareness stifled by inventory, knowledge gaps

SC Magazine

MRIs are among the tech many providers struggle to secure. Health care providers are increasingly aware of the need to secure the vast landscape of medical devices. However, the sector yet to meet necessary inventory and security measures to stymie this critical threat. The current medical device landscape.

article thumbnail

VPNs still dominate post-COVID, but businesses are sniffing for alternatives

SC Magazine

A recent report from Zscaler found that VPNs are still overwhelmingly popular: 93 percent of companies surveyed reported that they have used them in some capacity. Virtual Private Networks have been around for decades, but over the past year many organizations were forced to expand their use to keep up with growing telework trends.

VPN 52
article thumbnail

What Is Cloud Security? Everything You Need to Know

eSecurity Planet

Cloud security protects your critical information from unwanted access and potential threats through sophisticated procedures. Prioritizing cloud security helps guarantee that you have a safe, reliable resource for your data in today’s linked world. This increases user and service provider trust.

Backups 72