In previous blog posts we discussed new security approaches like Zero Trust and behavior-based security, and leveraging Artificial Intelligence (AI), Machine Learning (ML), and Big Data technologies in order to prevent attacks before they even happen, with the motto “never trust, always verify”.
In our last article, we talked about behavior-based security, a whole new approach to answer today’s security challenges by preventing an attack before it even happens. This may have seemed outlandish even a few years ago but is now a reality thanks to progress made in areas like Artificial Intelligence (AI), Machine Learning (ML), and Big Data technologies, providing the tremendous computational power required to finally get in front of an attack.
The attacks on the world’s largest meat supplier, JBS, from May 30, 2021, took place by theRansomware-as-a-Service (RaaS) group REvil (also known as Sodin/Sodinokibi), the FBI informed. Such attacks could endanger the global food supply chain, and show the vulnerable state of critical infrastructure worldwide.
Which Comes First: EPP, EDR or XDR? Recently there have been a few industry reports that have shed light – perhaps a confusing light – on BlackBerry’s cybersecurity vision. Rest assured, we are not wavering in our beliefs or slowed in our production. In fact, we’ve doubled the size of our portfolio in the last few months alone. We’ve released a new generation (the seventh) of our Cylance® AI engine math model (although our five-year-old model prevented Darkside just fine).
On Tuesday June 8th, iConstituent, a technology vendor used by dozens of House offices on Capitol Hill, became the latest high-profile victim of a ransomware attack. This crippling cyberattack on the constituent-outreach company comes on the heels of successful ransomware campaigns against a major U.S. pipeline system, Colonial Pipeline, the world’s largest meat supplier JBS, and electronics giant Acer.
Your smartphone is a universal communication tool and a platform that helps drive collaboration around sensitive topics, from the personal, all the way up to top-tier communication such as corporate conversations around financial and intellectual property data, and even military secrets. As a result, smartphones are an appealing target for nation-state intelligence agencies and others intent on malicious exploits.
It's World Password Day today, an annual celebration of the longest-lived cybersecurity control in computing history. Since the dawn of bits and bytes, passwords have been the pivotal first line of defense for the security of systems and networks.
Every day, organizations are impacted by critical events, including operational interruptions, network outages, cyber attacks, natural disasters, or other emergencies. According to a recent 2021 report from BCI, in 2020 nearly 50% of businesses faced IT or telecom incidents that triggered their emergency communications plans, while over 45% dealt with adverse weather or natural disasters.
Mobile devices make irresistible targets for threat actors because they’re both ubiquitous and vulnerable. In 2020, there were an estimated 3.5B smartphone users. This year, another 300 million are projected to join their ranks. For the first time, more than half of all devices connected to the Internet are mobile. Many of these devices will be used by remote workers to access their employers’ enterprise networks, cloud applications, and data. By 2024, mobile workers are projected to...
Secure and protect your users and devices, even BYOD laptops and smartphones, with a solution that’s focused on earning trust across any endpoint and continuously validating that trust at every event or transaction.