The attacks on the world’s largest meat supplier, JBS, from May 30, 2021, took place by theRansomware-as-a-Service (RaaS) group REvil (also known as Sodin/Sodinokibi), the FBI informed. Such attacks could endanger the global food supply chain, and show the vulnerable state of critical infrastructure worldwide.
Which Comes First: EPP, EDR or XDR? Recently there have been a few industry reports that have shed light – perhaps a confusing light – on BlackBerry’s cybersecurity vision. Rest assured, we are not wavering in our beliefs or slowed in our production. In fact, we’ve doubled the size of our portfolio in the last few months alone. We’ve released a new generation (the seventh) of our Cylance® AI engine math model (although our five-year-old model prevented Darkside just fine).
On Tuesday June 8th, iConstituent, a technology vendor used by dozens of House offices on Capitol Hill, became the latest high-profile victim of a ransomware attack. This crippling cyberattack on the constituent-outreach company comes on the heels of successful ransomware campaigns against a major U.S. pipeline system, Colonial Pipeline, the world’s largest meat supplier JBS, and electronics giant Acer.
It's World Password Day today, an annual celebration of the longest-lived cybersecurity control in computing history. Since the dawn of bits and bytes, passwords have been the pivotal first line of defense for the security of systems and networks.
Every day, organizations are impacted by critical events, including operational interruptions, network outages, cyber attacks, natural disasters, or other emergencies. According to a recent 2021 report from BCI, in 2020 nearly 50% of businesses faced IT or telecom incidents that triggered their emergency communications plans, while over 45% dealt with adverse weather or natural disasters.
Mobile devices make irresistible targets for threat actors because they’re both ubiquitous and vulnerable. In 2020, there were an estimated 3.5B smartphone users. This year, another 300 million are projected to join their ranks. For the first time, more than half of all devices connected to the Internet are mobile. Many of these devices will be used by remote workers to access their employers’ enterprise networks, cloud applications, and data. By 2024, mobile workers are projected to...
Thanks to the pandemic, the zero trust cybersecurity model has come into its own. However, like most things concerning cybersecurity, zero trust has a good side, a bad side and an ugly side. Before one get into that, there is a need to agree upon what zero trust means, as there are many different definitions floating around cyber space.
Secure and protect your users and devices, even BYOD laptops and smartphones, with a solution that’s focused on earning trust across any endpoint and continuously validating that trust at every event or transaction.
McAfee’s announcement that it was exiting the enterprise security space to focus exclusively on the consumer market was not entirely unexpected. Many large businesses had become disenchanted with the firm’s ‘ security supermarket’ approach to cyber-risk management, and the resulting costs and complexities of having to manage and upgrade multiple incompatible toolkits. McAfee had also stumbled in its efforts to update its legacy AV technologies and meet customer demands for effective...
The BlackBerry® 2021 Threat Report examines the biggest cybersecurity events of last year and the cybersecurity issues likely to impact the upcoming year. Our analysis is derived from customer and industry threat data that spans 2020 and is presented for the benefit of security professionals and interested readers.