Cyberattacks

State of Cybersecurity 2020

More than ever, companies are accepting that digital business is the way of the future. Regardless of the industry, offering or customer base, digital tactics are needed to survive in a dynamic and unpredictable environment. With this in mind, cybersecurity moves from a piece of IT operations into an overarching business concern. From formal policies

State of Cybersecurity 2020 Read More »

State of Cybersecurity 2020

State of Cybersecurity 2020 – More than ever, companies are accepting that digital business is the way of the future. Regardless of the industry, offering or customer base, digital tactics are needed to survive in a dynamic and unpredictable environment. With this in mind, cybersecurity moves from a piece of IT operations into an overarching

State of Cybersecurity 2020 Read More »

Curve of Convenience 2020 Report: The Privacy-Convenience Paradox

INTRODUCTION As Asia Pacific edges towards becoming a digital-first economy, organizations across the region are realizing that applications are fast becoming their most business valuable asset. Yet, at a time when both the private and public sectors are redefining what a good user experience means in today’s world, consumer trust continues to wane as cyberattacks

Curve of Convenience 2020 Report: The Privacy-Convenience Paradox Read More »

Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection

Introduction The goal of this National Institute of Standards and Technology (NIST) Interagency Report (NISTIR) is to show practical approaches that manufacturers can use to strengthen cybersecurity in their manufacturing processes. Behavioral anomaly detection (BAD) tools can provide a key security component for sustaining business operations, particularly those based on industrial control systems (ICS). Because

Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection Read More »

Australia Threat Report: Extended enterprise under threat

Introduction This research was conducted to understand the challenges and issues facing Australian businesses when it comes to escalating cyberattacks. It identifies trends in hacking and malicious attacks and the financial and reputational impact any breaches have had. It examines Australian organizations’ plans for securing new technology, for adopting cybersecurity frameworks and the complexity of

Australia Threat Report: Extended enterprise under threat Read More »

Operation In(ter)ception: Targeted attacks against European aerospace and military companies

ESET researchers have discovered an operation, with a possible link to the infamous Lazarus group, that used unconventional spearphishing and custom, multistage malware against aerospace and military companies. ESET researchers have discovered highly targeted cyberattacks that are notable for using LinkedIn-based spearphishing, employing effective tricks to stay under the radar and apparently having financial gain,

Operation In(ter)ception: Targeted attacks against European aerospace and military companies Read More »

Cloud Adoption & Risk Report – Work-from-Home Edition

The report uncovers a correlation between the increased use of cloud services and collaboration tools, such as Cisco WebEx, Zoom, Microsoft Teams and Slack during the COVID-19 pandemic, along with an increase in cyber-attacks targeting the cloud. Based on anonymised and aggregated data from more than 30 million McAfee MVISION Cloud users worldwide between January and April, the report reveals significant and potentially long-lasting trends that include an increase in the use of cloud services, access from unmanaged

Cloud Adoption & Risk Report – Work-from-Home Edition Read More »

Securing What’s Now and What’s Next: 20 Cybersecurity Considerations for 2020

Security leaders, while supporting business growth and digital transformation, struggle with a multitude of challenges. We know this because you tell us, both in ongoing conversations and as part of our annual benchmark survey. Some challenges are focused on security, such as needing better visibility or automation, or striving for greater simplicity of management and

Securing What’s Now and What’s Next: 20 Cybersecurity Considerations for 2020 Read More »

2020 Cybersecurity Outlook Report

The conflict of “good vs. evil” is a theme that’s captivated humanity throughout history, spanning religion, ethics, philosophy, politics, art, literature, and cinema. Often with larger-than-life characters leading the narrative, the “good vs. evil” conflict reveals humanity’s intrinsic desire to be safe amidst an omniscient and, often, ephemeral sense of fear. In cybersecurity, this conflict

2020 Cybersecurity Outlook Report Read More »