The human element in cybersecurity

According to IBM’s Cost of a Data Breach Report 2021, the global average cost of a data breach is estimated to be $4.24 million. Cyberattacks cost organizations time and money, not only in the form of data loss but also …

AD360 3 min read Read

Implementing endpoint and network security for a hybrid workforce model

The onslaught of the COVID-19 pandemic brought about many changes and disruptions in cybersecurity. Organizations globally shifted to remote work scenarios to enable their employees to work from the comfort of their homes. Since this was a sudden decision, many …

AD360 3 min read Read

Developing a risk-based approach to cybersecurity in the hybrid workforce model

The hybrid workforce model is a novel workplace trend that provides employees the freedom to work from their homes while occasionally reporting to their offices. At the onset of the COVID-19 pandemic, organizations all over the world were forced to …

AD360 3 min read Read

Reinventing cybersecurity with a multi-layered approach

The complexity of cybersecurity threats has increased over the years. Additionally, the number of attack surfaces that can be used by cybercriminals has expanded phenomenally with the rise in remote and hybrid workplace models. With such a wide scope of …

AD360 3 min read Read

3 must-dos for IT admins in healthcare organizations to secure patients’ data and privacy

Since the beginning of the pandemic, there has been an increase in the volume of sensitive patient data being stored and processed by healthcare organizations. A patient’s health history, including all the treatments, procedures, prescriptions, lab tests, and scan reports, …

AD360 2 min read Read

Ransomware: How attackers weaponize Active Directory, and what defense measures can stop them [Free e-book]

Ransomware attacks continue to rattle organizations across the globe. Especially worrisome is the fact that many of them are exploiting Active Directory (AD), a crucial technology that forms the very foundation of most of today’s IT environments.

Access to an …

AD360 2 min read Read

3 reasons SMBs are more vulnerable to cyberattacks than large enterprises

Details about cyberattacks on small-and-medium-sized businesses (SMBs) may not make it to the headlines, but numerous industry reports and surveys have highlighted the grim reality of the SMB cybersecurity landscape. Even before the COVID-19 pandemic, SMBs were largely targeted …

AD360 3 min read Read

Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations

On March 9, 2021, Verkada, a software company that specializes in making security cameras for monitoring physical access control, was subject to a security hack.

Hackers gained access to the video feed of at least 15 thousand cameras deployed across …

AD360 3 min read Read

The NIST Cybersecurity Framework: 5 core functions and how to align with them using AD360

The Cybersecurity Framework (CSF) was developed by the National Institute of Standards and Technology (NIST), a division of the U.S. Department of Commerce.

This framework was created through collaboration between various private-sector and government experts to provide high-level taxonomy of …

AD360 1 min read Read