cyber threats

Anatomy of a Cloud Assessment and Authorisation

Introduction Cloud computing offers a range of potential cyber security benefits for Cloud Consumers to leverage, providing access to advanced security technologies, shared responsibilities, fine-grained access management, comprehensive monitoring and highly redundant geographically dispersed cloud services. For many organisations, cloud computing can provide significant improvements to their cyber security, mitigating the risk of many current […]

Anatomy of a Cloud Assessment and Authorisation Read More »

What is Lurking on Your Network

Exposing the threat of shadow devices Most internet communications rely on DNS, although it is often not sufficiently secured, which creates vulnerabilities that can be exploited for data exfiltration and spreading malware. Over 91 percent of malware uses DNS to communicate with C&C servers, lock up data for ransom or exfiltrate data. Existing security controls,

What is Lurking on Your Network Read More »

Cloud Threat Landscape Report 2020

Introduction With organizations increasingly using cloud environments for scaling and accelerating operations, understanding the unique cyber threat landscape of this field is critical. Leveraging IBM’s global presence and cloud incident response capabilities, we have conducted an in-depth analysis of cloud-related cybersecurity incidents our team has responded to over the past year in order to discern

Cloud Threat Landscape Report 2020 Read More »

Innovate for Cyber Resilience

Third Annual State of Cyber Resilience Lessons from Leaders to Master Cybersecurity Execution At first glance, the basics of cybersecurity are improving and cyber resilience is on the rise. Our latest research shows that most organizations are getting better at preventing direct cyberattacks. But in the shape-shifting world of cybersecurity, attackers have already moved on

Innovate for Cyber Resilience Read More »

The 2020 State of Password and Authentication Security Behaviors Report

Cyber threats and attacks on individual users and organizations have not diminished. Phishing scams, stolen credentials, and account takeovers continue to rise, making it imperative for businesses to have policies and practices in place to reduce the risks created by poor password and authentication behaviors. What is perhaps more important is that the security policies

The 2020 State of Password and Authentication Security Behaviors Report Read More »

State of the Phish 2019

The report uncovers phishing cyberattack trends across more than 15 industries and details the fundamental cybersecurity knowledge of more than 7,000 working adults in Australia, the U.S., France, Germany, Italy, Japan, and the UK. Data from tens of millions of simulated phishing attacks sent over a one-year period were analysed along with nearly 15,000 cybersecurity professional survey responses, from both Proofpoint customers and outside organisations, to provide an in-depth look at state of global phishing attacks.

State of the Phish 2019 Read More »

The Future of Cybersecurity in Asia Pacific and Japan – Culture, Efficiency, Awareness

Sophos has announced the findings of its report, The Future of Cybersecurity in Asia Pacific and Japan – Culture, Efficiency, Awareness which reveals that the success of an organisation’s cybersecurity investment lies in more than buying technology, with corporate culture, employee education and path-to-purchase playing a critical role.

The Future of Cybersecurity in Asia Pacific and Japan – Culture, Efficiency, Awareness Read More »