Cybersecurity is an evergreen priority for users, manufacturers, and business leaders alike, especially with the uptick in cyberattacks in 2022.
This year, ITPro Today readers focused on Russia’s invasion of Ukraine, which involved cyberattacks and a tech boycott; increasingly sophisticated ransomware; and vulnerabilities in firmware, Active Directory, and machine identity management.
Here’s a roundup of ITPro Today's most-read cybersecurity stories in 2022.
The U.S. led a boycott against Russia, depriving the nation access to digital platforms, tech, and weapons components, in hopes that Putin will feel the ramifications of his decision to invade Ukraine. Learn about the boycott and its risks.
A Semperis report showed that organizations have significant security gaps around Active Directory, which can expose data to stealth cyberattacks. Read more about the security failings as well as possible solutions.
Executives are focused on digital transformation, but to grow they must first address a host of other challenges. Contributor Nathan Eddy explores the top concerns of executive leadership.
Further reading: IT Security Decision Makers Struggle to Implement Strategies
Tech expert Brien Posey expands on Microsoft’s “The 10 Immutable Laws of Security Administration” and provides actionable tips to reinforce data security.
Firmware security has not always been a high priority for manufacturers. Companies like Microchip are developing root of trust technologies to provide users with enhanced protections.
While investing in security is always a smart move, money can be wasted when you base your budget on the latest cybersecurity trends or model your approach after the needs of other businesses. This article provides tips for devising a holistic cybersecurity plan.
Ransomware groups have successfully run payloads hidden in virtual machines, but this attack method proves difficult to execute. Dark Reading senior editor Kelly Sheridan explains the likelihood of such an attack as well as the measures business leaders can take to protect themselves.
Further reading: Ransomware Security for IT Pros: 2022 Report
A host of cybersecurity startups vie for attention in an increasingly crowded field. Here’s a roundup of some of the exciting new security products showcased at this year’s RSA convention.
The exponential growth in IoT devices and remote workforces means that machine identities are shared across many devices and move through different systems. This has made securing data an unwieldy task. Contributor Maria Korolov explores the impact of mismanaged machine identities.
When selecting security products, business leaders should opt for a big picture approach that considers more than just initial cost. This article provides an in-depth look at what customers need to consider.
What was the most important technology product you used for cybersecurity in 2022? Tell us below in the comments!