18 is the New 20

In May 2021, CIS launched a new version of their controls, version 8.
The CIS controls are a set of actionable controls recommended to help organisations defend against cyber attacks. Tom Madsen takes a look at the differences between this version and the previous, and how the controls better align to current world cyber threats.

Read more

Drill Down into the EU Toolbox for 5G Security

5G networks are becoming a key part of our critical infrastructure, enabling wireless networking in a broad range of scenarios from mobile broadband to massive IoT. Until recently though there has only been moderate noticeable output by national regulators on the specific security risks 5G systems are subject to.
Cybersecurity Magazine takes a look at the efforts made by the EU and its “Toolbox” to better realize guidance beyond industry standards and ensure a common security baseline at scale.

Read more

10 Small Business Cyber Security Statistics That You Should Know – And How To Improve Them

All enterprises have to handle customer data, including PII, but often small businesses do not have the resources to effectively safeguard against cyber threats.

In the latest Cybersecurity Magazine article, Ashley Lukehart offers 10 important cybersecurity statistics regarding the reality of cyberattacks on small businesses, and gives some tips on how small businesses should approach cybersecurity attack prevention

Read more

Zero Trust Security Best Practices

Since the start of the COVID19 pandemic, enterprises worldwide have adopted the work-from-home model. This shift has resulted in an increase in cyberattacks, and some traditional models of security are becoming ineffective as employees increasingly access resources remotely and use personal devices.
In the latest Cybersecurity Magazine article, Varin Khera argues for the use of ‘zero-trust’ security models and examines the best practices for adopting such a model.

Read more

What Does 5G Mean for Global DDoS Vulnerability?

As the rollout of 5G continues, we look to the variety of applications it invites.
However, with such innovation also comes an increased risk for DDoS security.
Ramil Khantimirov, Stormwall, discusses how the global 5G coverage in tandem with IoT spurs novel cybersecurity vulnerabilities and outlines some steps the industry should take to prepare.

Read more

From Ransomware To Recovery – The Role Of Continuous Data Protection

Ransomware has become one of the most high profile cybersecurity problems, with a huge rise in the number of ransomware attacks in the past years as business attempt to deal with the operational flux brought by the pandemic. Steve Blow, Zerto, discusses the impact of ransomware and argues for a more modern mindset and use of Continuous Data Protection.

Read more