Only 3% of public sector applications are free of flaws.

Only 3% of public sector applications are free of flaws.

Recently, Veracode analyzed the security debt and application risk management in the public sector. The report found that security debt, defined as flaws that remain unfixed for over a year, exists in 59% of applications in the public sector, compared to the overall rate of 42%. Public sector organizations tend to accumulate more security debt, […]

Data breach disclosed by WD Associates

WD Associates recently announced a data security incident. They discovered suspicious activity on certain workstations and servers within their environment. An investigation found that certain files on WD’s network were accessed or taken by an unauthorized party between February 1, 2023 and February 9, 2023. The investigation revealed that the accessed files contained personal information […]

87% of medical practice information is stored digitally

Healthcare cybersecurity and ransomware attacks were examined in a recent report by Software Advice. The report revealed that over a quarter of ransomware attacks directly impact patient care, leading to disrupted medical services, lost data, and compromised patient safety. The report also highlighted that the majority (87%) of data held in medical practices today is […]

New regulations cause 93% of companies to reassess cybersecurity strategies

A recent report from Swimlane investigates the impact of the changing regulatory landscape on security budgets and compliance strategies. The report surveyed 500 cybersecurity decision-makers in the United States and the United Kingdom, focusing on enterprises with 1,000 or more employees. According to the report, 93% of organizations have reassessed their cybersecurity strategies due to […]

Cybercriminals are using catfishing tactics to target victims and spread malware

A report from HP Wolf Security reveals that cybercriminals are employing overdue invoice scams, open redirects, and Living-off-the-Land (LotL) tactics to evade cybersecurity measures. The report examines actual attacks observed in Q1, highlighting significant campaigns such as cat-phishing, Windows Background Intelligent Transfer Service (BITS) exploitation, and HTML smuggling. Attackers utilized open redirects in cat-phishing schemes, […]

Damage occurs in nearly 90% of organizations following a security incident

Security incident response was recently examined by Cado Security, revealing that almost 90% of organizations experience damage before effectively containing and investigating incidents. Challenges and complexities result in 23% of cloud alerts going unresolved by organizations. The study indicates that 82% of organizations find it necessary to utilize multiple platforms and tools for cloud investigations. […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

TSP
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.