Security

Cyber Security for Data Sovereignty

Data sovereignty is the idea that data collected, stored, and processed by an organization is subject to the laws and best practices of the country in which it is located. Data localization is closely related to data sovereignty – the idea of processing data locally within the jurisdiction it was initially collected in. Data localization […]

Read More
Security

IOTW: Is your company at risk from this mysterious hacker group?

A movement that is barely detected. Activity so stealthy that it’s gone undiscovered for the past five years. Hacking that leaves such a small footprint cannot even be attributed to one group – instead, it’s only noticeable when certain activities occur. These might sound like the fever dreams of a would-be hacker still living in […]

Read More
Security

What to Expect from CS Hub’s Global Summit 2022

Cybersecurity issues are one of the biggest concerns for organizations today and have become front-page news as we are firmly in an era of digital expansion. Digital transformation, combined with external factors like the Covid-19 pandemic and geopolitical issues, has seen the network boundaries of organizations expand exponentially, and the attack surface is more significant than ever. […]

Read More
Security

Managed XDR programs go beyond endpoint detection and reaction.

Security owners and CISOs, particularly those who run small and medium-sized businesses, are faced with several challenges. They must optimize their security investments to combat the constantly evolving security threats and to avoid alert fatigue. BlackBerry’s 2022 Threat report revealed that SMBs receive between 11 and 13 threats per device per day. In CS Hub’s […]

Read More
Security

Five ransomware groups and their tactics

According to Verizon’s 2022 Data Breach Investigations report, ransomware attacks are on the rise and have increased 13% compared to last year. This is why it’s essential to understand that cyber threats are a severe threat to any organization without solid security. We continue our discussion of the five top ransomware gangs in the article Five […]

Read More
Security

Cloud configuration security: the state of the art

Cloud computing is expected to increase exponentially through 2022. Cyber Security Hub’s Cloud Configuration, Security Practices Survey found that enterprise companies from sectors such as financial services, healthcare, and communications had, on average, 29 cloud-based applications in November 2021. This number is expected to increase to 144 over the next year. This is a 395 […]

Read More
Security

What is social engineering, and what are its applications?

Marriott International recently suffered a data breach that affected 400 customers. After the breach, Marriott International explained that the hacker who was responsible had used a social engineering technique to gain unauthorized access to their systems. This article by CS Hub explains social engineering and how businesses can protect themselves from this manipulative threat. What is […]

Read More
Security

What are the main challenges for CISOs?

I have been a chief information security officer for many years and know the job is challenging and thankless. CISOs are employed by companies that have a lot of assets and data. It is their job to safeguard that data, to ensure compliance, and to help the company grow. Due to my love for water, […]

Read More
Security

More and more data breaches are occurring on gaming websites.

In July this year, three prominent gaming websites, Roblox Neopets and Bandai Namco, were all affected by data breaches. The incidents occurred within three weeks. The data of up to 69 million Neopets players was leaked. Bandai Namco, which publishes Eldenring, Tekken, and Dark Souls, confirmed that an evil act had gained unauthorized entry to the company’s systems. […]

Read More
Security

Endpoint security is a priority for over two-fifths of security professionals.

CS Hub’s research has shown that cyber security practitioners invest primarily in endpoint security, threat detection, and response controls. In the CS hub Mid-Year market report 2022, 44 percent of respondents stated that their organizations are currently investing in endpoint security controls, while 42 percent said they are investing in threat detection, response, and management. Endpoint security protects […]

Read More