The cyber threat landscape has become a significant challenge for businesses as cybercriminals keep evolving and creating more sophisticated methods to acquire valuable information. Developing a comprehensive security strategy will help businesses be prepared against cyber threats while minimizing losses. Salzberg, Jeremiah. 2023. “Navigating the Threat Landscape: The Growing Menace of Cybercrime.” Security Magazine, May […]read more
As the cyber threat landscape continues to rapidly evolve, a new cybersecurity paradigm has emerged: the zero trust model. This approach recognizes the importance of denying default access to data and applications, promoting a proactive stance of never trusting and always verifying for enhanced security. McDonald, Adrian. 2022. “New Cyber Threat Landscape Spurs Shift to […]read more
Penetration testing, or ethical hacking, has become a key process for organizations to identify and correct vulnerabilities in their systems before they can be exploited by cybercriminals. However, there are ethical and legal considerations that organizations must take into account in order to successfully conduct penetration testing in a responsible manner. Gillam, Jason. 2023. “What […]read more
Risk-Based Patch Management assists IT teams in optimizing their time by identifying the priority of threats. By prioritizing the mitigation of critical threats, it enables the team to concentrate their efforts on addressing the most urgent vulnerabilities. This approach allows the team to make significant progress in establishing an effective patch management strategy while ensuring […]read more
The BBC, British Airways and Boots have all confirmed data breaches as a result of an attack on Zellis, a British enterprise payroll provider.
Zellis has fallen victim to exploitation of a zero day (previously unknown) vulnerability in enterprise file transfer software “MOVEit Transfer.”read more
Japanese car maker Toyota this week announced that cloud configuration issues have led to years-long exposure of customer data.
The impacted environments, which are managed by Toyota Connected Corporation (TC), contain information related to the vehicles of Japanese customers, as well as the personal information of customers overseas.read more
The firm’s data, which was initially reported by Bleeping Computer, shows that 362 servers in the U.S. and 240 servers in Canada had been affected by the ransomware, as of this writing. More than 2,400 servers running the VMware ESXi hypervisor are currently impacted in total, and the U.S. and Canada rank second and fourth, respectively, in terms of […]read more
The sophistication of the technology employed by threat actors has increased along with the number of threats. Data has evolved as an essential resource of an intelligent business, used for everything from daily operations to developing long-term plans. Data security becomes increasingly tricky as its value and business importance increase. Organizations are becoming aware of […]read more
In the two weeks since the Hospital for Sick Children in Toronto was the target of a ransomware attack, the institution continues to deal with cybersecurity issues. Nick Westoll reports. It’s been two weeks since the Hospital for Sick Kids was the target of a ransomware attack, and not only are sick kids staff still […]read more
The mantra of the year: Trust no one. Technology executives in a recent CIO Journal end-of-year survey shared their priorities for 2023. While recruiting and retaining talent and leading through a tightening economy topped many to-do lists, the long tail of priorities encompassed everything from modernization to sustainability. Below are edited highlights of CIO responses […]read more