<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <copyright>Copyright TechTarget - All rights reserved</copyright>
        <description></description>
        <docs>https://cyber.law.harvard.edu/rss/rss.html</docs>
        <generator>Techtarget Feed Generator</generator>
        <language>en</language>
        <lastBuildDate>Mon, 27 Apr 2026 04:58:13 GMT</lastBuildDate>
        <link>https://www.techtarget.com/searchsecurity</link>
        <managingEditor>editor@techtarget.com</managingEditor>
        <item>
            <body>&lt;p&gt;Data centers must demonstrate compliance with industry standard guidelines. This quick checklist helps administrators create &lt;a href="https://www.techtarget.com/searchsecurity/definition/data-compliance"&gt;data compliance&lt;/a&gt; strategies to ensure the security of their customers' data and maintain high operational standards.&lt;/p&gt; 
&lt;p&gt;Data centers are responsible for securely managing data for an organization's customers. A single data outage or breach can devastate the business that depends on that data and be &lt;a href="https://www.techtarget.com/searchdatacenter/tip/Data-center-safety-tips-to-protect-staff"&gt;catastrophic for a data center facility&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;An effective&lt;a href="https://www.techtarget.com/searchdatamanagement/tip/10-key-elements-to-follow-data-compliance-regulations"&gt; &lt;/a&gt;&lt;a href="https://www.techtarget.com/searchdatamanagement/tip/10-key-elements-to-follow-data-compliance-regulations"&gt;compliance strategy&lt;/a&gt; can help any data center&lt;a href="https://www.techtarget.com/searchdatabackup/tip/Comparing-data-protection-vs-data-security-vs-data-privacy"&gt; &lt;/a&gt;&lt;a href="https://www.techtarget.com/searchdatabackup/tip/Comparing-data-protection-vs-data-security-vs-data-privacy"&gt;secure the sensitive data&lt;/a&gt; it handles. The compliance strategy then becomes the foundation for highly available service delivery and drives long-term customer satisfaction.&lt;/p&gt; 
&lt;p&gt;The compliance landscape has grown significantly more complex in the last few years. New regulations covering AI governance, sustainability reporting and cybersecurity disclosure have added fresh obligations for data center operators. Facilities intending to create or update a data center compliance strategy can use this checklist as a starting point.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="1. Align data center and IT teams"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;a name="_v8qjmnje5aye"&gt;&lt;/a&gt;1. Align data center and IT teams&lt;/h2&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchsecurity/Data-security-guide-Everything-you-need-to-know"&gt;Data security&lt;/a&gt; often resides with interested or affected groups within the organization. True data center&lt;a href="https://www.techtarget.com/searchdatamanagement/tip/3-considerations-for-a-data-compliance-management-strategy"&gt; &lt;/a&gt;&lt;a href="https://www.techtarget.com/searchdatamanagement/tip/3-considerations-for-a-data-compliance-management-strategy"&gt;data compliance requires alignment across an entire company&lt;/a&gt;. Data center administrators must align or communicate with customer compliance teams to ensure full coverage.&lt;/p&gt;
 &lt;p&gt;Admins should obtain approval from senior leaders in relevant teams and clarify how department relationships work. They should define each team and member's role in the strategy. This transparency increases the chances of acceptance and ensures compliance with the processes and procedures.&lt;/p&gt;
 &lt;p&gt;As of 2026, many organizations are appointing a dedicated Chief Compliance Officer (CCO) or Chief Data Officer (CDO) to lead compliance efforts, reflecting the growing regulatory burden. Data center operators should evaluate whether their current leadership structures can manage the expanding scope of requirements, particularly in AI governance and sustainability.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="2. Discover compliance options"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;a name="_1ad5269cr7ie"&gt;&lt;/a&gt;2. Discover compliance options&lt;/h2&gt;
 &lt;p&gt;Different compliance standards have distinct guidelines. If a data center handles healthcare data, for instance, it must be HIPAA certified and demonstrate compliance for patient privacy. If it handles e-commerce data, such as online stores or financial transactions, it must comply with the Payment Card Industry Data Security Standard (&lt;a href="https://www.techtarget.com/searchsecurity/definition/PCI-DSS-compliance-Payment-Card-Industry-Data-Security-Standard-compliance"&gt;PCI DSS&lt;/a&gt;) 4.0 to protect transmitted data, such as credit card information.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Note:&lt;/b&gt; PCI DSS 3.2.1 was retired in March 2024. Organizations must now comply with PCI DSS 4.0, which introduces enhanced authentication and monitoring requirements.&lt;/p&gt;
 &lt;p&gt;Other foundational standards that data centers should be familiar with include:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;SOC 2:&lt;/b&gt; The gold standard for cloud and SaaS providers, developed by the AICPA, covering security, availability, processing integrity, confidentiality and privacy.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;&lt;a href="https://www.techtarget.com/whatis/definition/ISO-27001"&gt;ISO 27001&lt;/a&gt;:&lt;/b&gt; An internationally recognized framework for information security management systems.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/whatis/definition/General-Data-Protection-Regulation-GDPR"&gt;&lt;b&gt;GDPR&lt;/b&gt;&lt;/a&gt;&lt;b&gt;:&lt;/b&gt; Required for any facility handling personal data of EU residents, regardless of where the data center is located.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.fedramp.gov/" target="_blank" rel="noopener"&gt;&lt;b&gt;FedRAMP&lt;/b&gt;&lt;/a&gt;&lt;b&gt;:&lt;/b&gt; Required for cloud service providers selling to U.S. federal agencies. The FedRAMP 20x initiative, introduced in early 2025, is streamlining third-party technology adoption by agencies.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/NIST"&gt;&lt;b&gt;NIST Cybersecurity Framework&lt;/b&gt;&lt;/a&gt;&lt;b&gt;:&lt;/b&gt; Increasingly referenced in government contracts and regulatory guidance. Often used as a foundational layer on which industry-specific requirements are built.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;&lt;a name="_k70bg7pkcjwl"&gt;&lt;/a&gt;Newer frameworks to know about&lt;/h3&gt;
 &lt;p&gt;There are several new frameworks and regulations that data center owners need to be aware of, in case they apply to them or their hosted clients.&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;a href="https://artificialintelligenceact.eu/the-act/" target="_blank" rel="noopener"&gt;&lt;b&gt;EU AI Act&lt;/b&gt;&lt;/a&gt;&lt;b&gt;:&lt;/b&gt; The most comprehensive AI regulation to date, the EU AI Act began broad enforcement in 2025 and 2026. It imposes requirements for risk assessments, transparency reporting and disclosures on organizations running AI workloads and their hosting infrastructure. Data centers must be able to classify workloads, document how they are isolated, secured and monitored, and explain the controls that govern data flows.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;ISO/IEC 42001:&lt;/b&gt; An international standard for AI Management Systems. This framework provides a certifiable structure for demonstrating compliance with globally recognized AI governance benchmarks to regulators, investors and customers.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;State-level regulations in the U.S.:&lt;/b&gt; These are multiplying rapidly. More than 200 bills aimed at regulating data centers were introduced across U.S. states in 2025, and more than 40 were enacted into law. Data center operators handling customer data across multiple states should closely track these developments, as requirements vary by jurisdiction.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="3. Learn compliance audit schedules"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;a name="_yer15zufcp2g"&gt;&lt;/a&gt;3. Learn compliance audit schedules&lt;/h2&gt;
 &lt;p&gt;Data centers must constantly review their operations and infrastructure. Small audits and updates of daily processes help keep things running smoothly, while thorough audits ensure data compliance. Most &lt;a href="https://www.techtarget.com/searchcio/definition/compliance-audit"&gt;compliance audits&lt;/a&gt; are conducted annually by third-party auditors, meaning facilities with multiple certifications must undergo several audits each year.&lt;/p&gt;
 &lt;p&gt;Data center staff and customers must be aware of the audit schedule, as it can affect regular facility operations. An organization must include this information in any &lt;a href="https://www.techtarget.com/searchitchannel/definition/service-level-agreement"&gt;service-level agreement&lt;/a&gt; in customer contracts to ensure operational transparency.&lt;/p&gt;
 &lt;p&gt;In 2026, the frequency of audits will increase for certain types of data centers. The &lt;a href="https://www.sec.gov/resources-small-businesses/small-business-compliance-guides/cybersecurity-risk-management-strategy-governance-incident-disclosure" target="_blank" rel="noopener"&gt;SEC's Cybersecurity Disclosure Rule&lt;/a&gt;, which became effective in December 2025, mandates annual Continuous Attestation Reports from independent third parties for facilities that handle securities-related workloads. Data centers serving those customers should include this requirement in their audit planning.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="4. Understand compliance proof"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;a name="_lyssfx5txgxi"&gt;&lt;/a&gt;4. Understand compliance proof&lt;/h2&gt;
 &lt;p&gt;Data centers can demonstrate their compliance by publishing the certificates and certifications they receive. What they should publish depends on the specific audit guidelines.&lt;a href="https://www.thehartford.com/insights/cyber/cyber-third-party-assessments"&gt; &lt;/a&gt;Third-party auditing services award these certificates on behalf of the governing body and regularly assess the data center's operations and infrastructure.&lt;/p&gt;
 &lt;p&gt;The certifications data centers require depend on their customers and specific compliance guidelines, so organizations should ensure they stay up to date.&lt;/p&gt;
 &lt;p&gt;Proof of compliance is also evolving beyond paper certifications. The &lt;a href="https://www.computerweekly.com/news/366630833/EU-Data-Act-comes-into-force-amid-fears-of-regulation-fatigue"&gt;EU Data Act&lt;/a&gt;, which took effect in 2026, requires verifiable transparency records for the entire data flow chain, including cross-border transfers and data sources used for model training. Regulators in some jurisdictions now expect real-time or near-real-time access to compliance logs rather than point-in-time audit reports.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="5. Develop procedures to align with compliance rules"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;a name="_hcjegjs2nukh"&gt;&lt;/a&gt;5. Develop procedures to align with compliance rules&lt;/h2&gt;
 &lt;p&gt;Data center staff must align their procedures with the compliance rules they follow, as compliance audits are conducted regularly. Example processes and procedures include:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Security gap ID.&lt;/b&gt; Data center admins should conduct a network inventory to identify any security risks, vulnerabilities and exposures.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Physical security review.&lt;/b&gt; Facility staff should verify the&lt;a href="https://www.techtarget.com/searchdatacenter/news/4500248374/Data-center-physical-security-gets-a-tougher-look"&gt; &lt;/a&gt;physical access control of devices in the facilities. They should also install surveillance cameras and other monitoring equipment.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Incident management.&lt;/b&gt; Data center staff should document the incident management process, procedures, roles and involved staff. This includes responses and remediation efforts during an incident.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Training processes. &lt;/b&gt;&lt;a href="https://www.techtarget.com/searchdatacenter/tip/What-does-a-data-center-facility-manager-do"&gt;Managers should ensure initial training&lt;/a&gt; for all staff, onboarding training for new staff and ongoing training for everyone. They should emphasize employee reporting procedures so data center admins can learn how to report nonconformance.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="6. Address AI workload governance"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;a name="_gdb5sqiyb2fj"&gt;&lt;/a&gt;6. Address AI workload governance&lt;/h2&gt;
 &lt;p&gt;AI has evolved from a rising workload to a dominant one for data centers. As AI infrastructure has expanded, regulators have begun enforcing specific governance standards for facilities that host or run AI workloads. Data center operators must develop a compliance strategy that clearly addresses AI, separate from general data management requirements.&lt;/p&gt;
 &lt;p&gt;Key areas of AI governance compliance to establish include:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Workload classification.&lt;/b&gt; Data centers should be able to identify and classify AI workloads by type and risk level, consistent with the EU AI Act's risk tiers -- unacceptable, high, limited and minimal risk. This classification determines which compliance requirements are applicable.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Transparency documentation.&lt;/b&gt; Operators should document how AI workloads are isolated, secured and monitored, and be able to explain the controls that govern related data flows.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;AI incident reporting.&lt;/b&gt; California's &lt;a href="https://www.gov.ca.gov/2025/09/29/governor-newsom-signs-sb-53-advancing-californias-world-leading-artificial-intelligence-industry/" target="_blank" rel="noopener"&gt;Transparency in Frontier Artificial Intelligence Act&lt;/a&gt;, effective January 1, 2026, requires critical safety incident management and reporting, including unauthorized access or modification of AI model weights. Data centers hosting such workloads should align their incident management procedures accordingly.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Supply chain and vendor accountability. &lt;/b&gt;AI compliance responsibilities are increasingly extending beyond operators to include supply chains and partners. Data centers should ensure that vendors and subprocessors handling AI-related data meet equivalent governance standards.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;The regulatory landscape for AI compliance is still developing. The U.S. federal government &lt;a href="https://www.techtarget.com/searchenterpriseai/feature/Who-wins-and-loses-with-Trumps-AI-executive-order"&gt;issued an executive order&lt;/a&gt; in December 2025 to establish a national AI policy framework, which may override some state-level AI laws. Data center operators should develop flexible compliance programs that can adapt to ongoing regulatory changes.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="7. Track sustainability and environmental compliance"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;a name="_ji0wzup5nu96"&gt;&lt;/a&gt;7. Track sustainability and environmental compliance&lt;/h2&gt;
 &lt;p&gt;Energy consumption and water use have become compliance issues, not just operational ones. Governments worldwide are intensifying efforts to address the environmental impact of data centers, particularly given the high energy demands of AI workloads. Data center operators, especially those with EU customers or operations, are subject to mandatory sustainability reporting requirements.&lt;/p&gt;
 &lt;p&gt;Key regulatory developments in this area include:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;a href="https://energy.ec.europa.eu/topics/energy-efficiency/energy-efficiency-targets-directive-and-rules/energy-efficiency-directive_en" target="_blank" rel="noopener"&gt;&lt;b&gt;EU Energy Efficiency Directive (EED)&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.&lt;/b&gt; A major revision of the EED took effect in 2023. It requires data centers to report operational efficiency metrics, including power usage effectiveness (PUE) and water usage effectiveness (WUE), and to adopt measures to optimize electricity and water use.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;U.S. state-level legislation.&lt;/b&gt; While the U.S. has no federal equivalent of the EED, state-level activity is accelerating. Oregon's POWER Act, enacted in August 2025, establishes special electricity rates for data centers and other large power consumers, incentivizing efficiency and grid-friendly load profiles. Data centers should monitor similar legislation in the states where they operate.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Energy reporting and green power procurement. &lt;/b&gt;The &lt;a href="https://www.congress.gov/crs-product/R48762" target="_blank" rel="noopener"&gt;Clean Cloud Act of 2025&lt;/a&gt; would authorize federal agencies to collect electricity-related information from data centers and their energy suppliers. Regardless of legislative outcome, operators should have systems in place to measure and report energy sourcing, especially for customers with renewable energy commitments.&lt;b&gt; &lt;/b&gt;&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Data centers should incorporate sustainability metrics into their compliance reporting systems rather than treating environmental reporting as a separate operational task. Monitoring PUE, WUE and carbon footprint data alongside traditional compliance information streamlines audit preparation and demonstrates operational maturity to regulators and enterprise customers.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt; This article was updated in March 2026 to update existing information and to add two new sections: "Address AI workload governance" and "Track sustainability and environmental compliance." This article now highlights the importance of data center security compliance in the age of AI.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Julia Borgini is a freelance technical copywriter, content marketer, content strategist and geek. She writes about B2B tech, SaaS, DevOps, the cloud and other tech topics.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Create a security compliance plan for the data center that includes various standards, audit schedules, and 2026 AI governance and sustainability reporting requirements.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/check_g1205300933.jpg</image>
            <link>https://www.techtarget.com/searchdatacenter/tip/Data-center-security-compliance-checklist</link>
            <pubDate>Tue, 10 Mar 2026 15:45:00 GMT</pubDate>
            <title>Data center security compliance checklist</title>
        </item>
        <item>
            <body>&lt;p&gt;Cybersecurity teams must be mindful at all times of the current threats their organization faces. While it's impossible to thwart every threat, stopping as many as possible and quickly detecting when they occur are both critical for reducing damage.&lt;/p&gt; 
&lt;p&gt;It is important to note that many cybersecurity incidents involve multiple types of threats. In a nutshell, a&amp;nbsp;&lt;i&gt;security threat&lt;/i&gt;&amp;nbsp;is a malicious act that aims to corrupt or steal data or disrupt an organization's systems or the entire organization. A&amp;nbsp;&lt;i&gt;security event&lt;/i&gt;&amp;nbsp;refers to an occurrence during which company data or its network might have been exposed. An event that results in a data or network breach is called a&amp;nbsp;&lt;i&gt;security incident&lt;/i&gt;.&lt;/p&gt; 
&lt;p&gt;Here are 10 types of threats that cybersecurity teams should focus on.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="1. Supply chain attacks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;1. Supply chain attacks&lt;/h2&gt;
 &lt;p&gt;Supply chain attacks are challenging to identify because they usually involve a breach or other cybersecurity compromise affecting a trusted third party, such as a supplier, partner, contractor, vendor or service provider. In this attack, the third party does not realize it has been compromised and therefore spreads the threat to its customers, partners and vendors.&lt;/p&gt;
 &lt;p&gt;For example, a vendor's software might accidentally be infected with malware during manufacturing, or bad actors might add malicious code that steals sensitive data from organizations using a service provider's offering. Another form of supply chain attack involves counterfeit products and legitimate products that have been tampered with after manufacturing and packaging.&lt;/p&gt;
 &lt;h3&gt;How to prevent supply chain attacks&lt;/h3&gt;
 &lt;p&gt;To prevent supply chain attacks, only work with trusted third-party vendors, service providers, partners and contractors. Perform &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-build-an-effective-third-party-risk-assessment-framework"&gt;third-party risk assessments&lt;/a&gt;, conduct continuous vendor monitoring and keep an accurate inventory of all third parties and their dependencies.&lt;/p&gt;
 &lt;p&gt;In addition, only purchase technology products and services from reputable manufacturers and vendors. Examine any physical technology purchases for anything suspicious, especially on product packaging or the product surface itself.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="2. Distributed denial-of-service attacks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;2. Distributed denial-of-service attacks&lt;/h2&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchsecurity/definition/distributed-denial-of-service-attack"&gt;DDoS&lt;/a&gt; attacks occur when thousands or millions of compromised devices simultaneously overwhelm a server, network or other target. The compromised devices are typically part of a botnet, enabling attackers to easily coordinate all devices in performing DDoS attacks. The goal of a DDoS attack is to disrupt the target's operations, preventing legitimate use of resources.&lt;/p&gt;
 &lt;h3&gt;How to prevent DDoS attacks&lt;/h3&gt;
 &lt;p&gt;Preventing DDoS attacks is a unique challenge. No matter how much capacity enterprise systems and networks have, a large DDoS attack can still clog them.&lt;/p&gt;
 &lt;p&gt;Options for mitigating DDoS attacks include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Partner with an MSP or other third party that specializes in DDoS attack monitoring and mitigation.&lt;/li&gt; 
  &lt;li&gt;Deploy and configure network security devices in front of systems and networks to &lt;a href="https://www.techtarget.com/searchsecurity/feature/Implement-API-rate-limiting-to-reduce-attack-surfaces"&gt;enforce rate limiting&lt;/a&gt; and stop traffic from known botnets.&lt;/li&gt; 
  &lt;li&gt;Design the organization's important applications with resilience in mind, such as duplicating key resources on other networks so that a DDoS attack against one network will not completely disrupt applications.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="3. Social engineering and phishing attacks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3. Social engineering and phishing attacks&lt;/h2&gt;
 &lt;p&gt;Social engineering comes in many forms, from someone pretending to be a delivery person in order to access a secure area to someone sending phishing emails, texts or other forms of messaging to deceive the recipient.&lt;/p&gt;
 &lt;p&gt;The goal of phishing, the most popular form of social engineering, is to get the recipient to divulge credentials, bank information or other sensitive data, or to install malware on the recipient's device.&lt;/p&gt;
 &lt;h3&gt;How to prevent social engineering and phishing attacks&lt;/h3&gt;
 &lt;p&gt;Some social engineering and phishing attacks can be stopped only by the intended victims. This requires that individual users be trained on &lt;a href="https://www.techtarget.com/searchsecurity/feature/How-to-avoid-phishing-hooks-A-checklist-for-your-end-users"&gt;how to identify attacks&lt;/a&gt; and what to do if an attack occurs. For example, they'll need to scrutinize links and email attachments for anything suspicious.&lt;/p&gt;
 &lt;p&gt;Many phishing attacks can be stopped through automated means, such as antispam and antimalware technologies, that are frequently updated with the latest threat intelligence. Some phishing attacks exploit software vulnerabilities, so keep all devices' software patched and up to date.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="4. Attacks through look-alike content"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;4. Attacks through look-alike content&lt;/h2&gt;
 &lt;p&gt;Attackers often craft websites, social media accounts, advertisements and other online content to look just like the real thing. When visited, that content &lt;a href="https://www.techtarget.com/searchsecurity/tip/10-common-types-of-malware-attacks-and-how-to-prevent-them"&gt;installs malware on users' computers&lt;/a&gt;. Known as &lt;i&gt;drive-by download attacks&lt;/i&gt;, users have no idea that anything bad has happened.&lt;/p&gt;
 &lt;h3&gt;How to prevent attacks through look-alike content&lt;/h3&gt;
 &lt;p&gt;Educate users on how to verify that URLs, social media accounts and other content are legitimate to prevent these attacks. Tell users not to click on advertisements from work devices.&lt;/p&gt;
 &lt;p&gt;To stay on top of the latest threats, consider subscribing to near-real-time &lt;a href="https://www.techtarget.com/searchsecurity/tip/Top-open-source-and-commercial-threat-intelligence-feeds"&gt;threat intelligence feeds&lt;/a&gt;. These can be consumed by an organization's cybersecurity technologies to quickly stop access to look-alike content once others detect and report it. Organizations should also keep software patched and up to date to minimize the risk of malicious content exploiting vulnerabilities.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="5. Misinformation and disinformation"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5. Misinformation and disinformation&lt;/h2&gt;
 &lt;p&gt;Misinformation is incorrect information, while disinformation is intentional misinformation designed to trick people -- another form of social engineering. Whether information is accidentally or intentionally wrong, the effect is the same: it convinces people that false statements are true and often triggers them to act on those false statements.&lt;/p&gt;
 &lt;p&gt;Misinformation and disinformation come in many forms. AI technologies are &lt;a href="https://www.techtarget.com/searchsecurity/tip/Real-world-AI-voice-cloning-attack-A-red-teaming-case-study"&gt;now widely used to create deepfake audio and video&lt;/a&gt; that often can't be distinguished from the real thing. Websites, emails and other content might also provide false instructions to users on how to improve security or functionality on their work computers. Rumors about the organization itself could also surface inside or outside the business.&lt;/p&gt;
 &lt;h3&gt;How to prevent misinformation and disinformation&lt;/h3&gt;
 &lt;p&gt;Misinformation and disinformation are often difficult to detect through automated means. Instead, rely on regularly scheduled &lt;a href="https://www.techtarget.com/searchsecurity/definition/security-awareness-training"&gt;security awareness training&lt;/a&gt; to teach employees how to spot misinformation and disinformation. Educate them on how to verify information pertaining to both internal and external matters. Also, provide a website where members of the public can verify the legitimacy of communications they receive from the organization, and provide a mechanism for the public to report misinformation and disinformation involving the organization.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="6. Credential compromise and account takeover"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;6. Credential compromise and account takeover&lt;/h2&gt;
 &lt;p&gt;Passwords, ID badges and other credentials are obvious targets for attackers. Passwords can be acquired in many ways, including social engineering and phishing, watching someone enter a password on their phone, guessing a password -- known as &lt;i&gt;brute-force attacking&lt;/i&gt; -- or reusing a previously compromised password that the person used for multiple accounts.&lt;/p&gt;
 &lt;p&gt;Possessing a password enables an attacker, in many cases, to access and control the user account. This is known as an &lt;i&gt;account takeover&lt;/i&gt;.&lt;/p&gt;
 &lt;h3&gt;How to prevent credential compromise and account takeover&lt;/h3&gt;
 &lt;p&gt;Avoid relying only on passwords for user authentication. Requiring MFA and switching from passwords to &lt;a href="https://www.techtarget.com/searchsecurity/definition/passwordless-authentication"&gt;passwordless authentication&lt;/a&gt; are two effective alternatives. If passwords are required, teach employees &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-create-a-strong-passphrase-with-examples"&gt;how to create strong passphrases&lt;/a&gt;, which are a more secure alternative to passwords.&lt;/p&gt;
 &lt;p&gt;In addition, train users on how to safeguard their credentials and what to do if they think one of their credentials has been compromised. Another helpful measure is to use cybersecurity technologies that monitor authentication attempts. Use these tools to identify anomalies, such as the same user connecting to email from different geographic locations at the same time, which could indicate someone masquerading as the user.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="7. Ransomware"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;7. Ransomware&lt;/h2&gt;
 &lt;p&gt;Ransomware uses encryption to make computers or files inaccessible or extortion to get victims to pay a ransom to get their stolen data back. While most ransomware attacks result from phishing or other forms of social engineering, some ransomware campaigns target exploitable software vulnerabilities.&lt;/p&gt;
 &lt;h3&gt;How to prevent ransomware&lt;/h3&gt;
 &lt;p&gt;Train users to avoid social engineering attacks, and teach them &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-effectively-respond-to-a-ransomware-attack"&gt;what to do if a ransomware infection occurs&lt;/a&gt;. Seconds can make a difference between a single computer being infected and an infection spreading throughout an organization.&lt;/p&gt;
 &lt;p&gt;To minimize vulnerabilities that ransomware can exploit, organizations should keep all software current with the latest patches and updates. It's also critical to use antimalware technologies that detect and stop ransomware, along with cyberthreat intelligence feeds that provide near-real-time updates on the latest ransomware threats.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="8. Persistence threats"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;8. Persistence threats&lt;/h2&gt;
 &lt;p&gt;Persistence refers to an attacker's ability to gain and then maintain access to a system without being detected. Known as &lt;i&gt;advanced persistent threats&lt;/i&gt; (&lt;a href="https://www.techtarget.com/searchsecurity/definition/advanced-persistent-threat-APT"&gt;APTs&lt;/a&gt;), attackers can persist unnoticed in compromised systems for days, weeks or months. During this time, they could access and exfiltrate sensitive data, compromise additional systems and monitor conditions until they are ready to launch a more devastating attack.&lt;/p&gt;
 &lt;h3&gt;How to prevent persistence&lt;/h3&gt;
 &lt;p&gt;Use firewalls and other network security tools, along with threat intelligence feeds, to block access to and from known malicious domains, IP addresses and websites. This denies APTs by disrupting the command-and-control channels they rely upon.&lt;/p&gt;
 &lt;p&gt;Monitor network traffic to look for signs of unauthorized access to internal systems. Use antimalware and antiphishing technologies to detect and stop attacks in transit. Also, scan the organization's devices regularly for signs of bots, exploit kits and other attack tools. Act swiftly whenever any such unauthorized tools are detected.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="9. Insider threats"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;9. Insider threats&lt;/h2&gt;
 &lt;p&gt;An insider threat is when an employee, contractor or other person within an organization misuses their technology privileges in ways that violate and harm the organization's cybersecurity. For example, an employee emailing sensitive data to external email addresses for the purposes of selling the data. A more complex example is two employees in different roles colluding to steal from the organization.&lt;/p&gt;
 &lt;h3&gt;How to prevent insider threats&lt;/h3&gt;
 &lt;p&gt;Follow the &lt;a href="https://www.techtarget.com/searchsecurity/definition/principle-of-least-privilege-POLP"&gt;principle of least privilege&lt;/a&gt; to ensure each user has the minimal access needed to do their job. Train all users, including contractors and vendors, on acceptable use policies and the potential consequences of violating them. Monitor all user activity for signs of suspicious behavior. Promptly investigate potentially malicious behavior.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="10. Accidental data leaks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;10. Accidental data leaks&lt;/h2&gt;
 &lt;p&gt;Accidental data leaks occur when an organization's sensitive data is inadvertently made available to unauthorized parties or systems. Examples include choosing the wrong recipient for an email, uploading the wrong file to a website or shared storage, or posting data for public access that has not yet been approved for release.&lt;/p&gt;
 &lt;p&gt;Data leaks can also occur when old or broken technologies are disposed of without first sanitizing or physically destroying their data storage. Printouts are also mechanisms for data leaks.&lt;/p&gt;
 &lt;h3&gt;How to prevent accidental data leaks&lt;/h3&gt;
 &lt;p&gt;Teach users to double-check recipients, attachments and other components of emails and other messages before sending them. Use &lt;a href="https://www.techtarget.com/searchsecurity/tip/Top-7-data-loss-prevention-tools"&gt;data loss prevention technologies&lt;/a&gt; to examine outbound emails and other applications for potential signs of data leaks. Carefully control physical access to printed sensitive data so that printouts are not left unattended and are shredded when no longer needed.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Karen Kent is the co-founder of Trusted Cyber Annex. She provides cybersecurity research and publication services to organizations and was formerly a senior computer scientist for NIST.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_a303249453.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/feature/Top-10-types-of-information-security-threats-for-IT-teams</link>
            <pubDate>Thu, 05 Feb 2026 09:00:00 GMT</pubDate>
            <title>10 types of information security threats for IT teams</title>
        </item>
        <item>
            <body>&lt;p&gt;Mobile compliance has become a core governance issue for modern enterprises. As smartphones and tablets are used to access customer, financial and operational data across industries, organizations must be able to demonstrate how that access is controlled, monitored and reviewed.&lt;/p&gt; 
&lt;p&gt;Unlike traditional endpoints, mobile devices operate across mixed ownership models, shifting networks and application ecosystems. Some devices are fully managed. Others are personal endpoints with limited enforcement. In both cases, compliance frameworks depend less on securing hardware and more on governing access to sensitive data across users, devices and applications.&lt;/p&gt; 
&lt;p&gt;Regulatory frameworks such as the Health Insurance Portability and Accountability Act (&lt;a href="https://www.techtarget.com/searchhealthit/definition/HIPAA"&gt;HIPAA&lt;/a&gt;), the Payment Card Industry Data Security Standard (&lt;a href="https://www.techtarget.com/searchsecurity/definition/PCI-DSS-Payment-Card-Industry-Data-Security-Standard"&gt;PCI DSS&lt;/a&gt;), the General Data Protection Regulation (&lt;a href="https://www.techtarget.com/whatis/definition/General-Data-Protection-Regulation-GDPR"&gt;GDPR&lt;/a&gt;) and state-level privacy laws differ in scope, but they share common expectations around access control, data handling, auditability and incident response. Mobile environments expose gaps in these areas faster than any other endpoint category.&lt;/p&gt; 
&lt;p&gt;Addressing mobile compliance requires organizations to rethink how policies, identity, application controls and monitoring work together across the device lifecycle.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What mobile compliance requirements are common in the enterprise?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What mobile compliance requirements are common in the enterprise?&lt;/h2&gt;
 &lt;p&gt;Mobile compliance requirements vary by regulation, but they share a common set of expectations that apply across industries and jurisdictions. At a high level, organizations are expected to know what data is being accessed on mobile devices, who can access it and how that access is governed over time.&lt;/p&gt;
 &lt;p&gt;Across privacy, financial and healthcare regulations, mobile compliance typically requires organizations to do the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Define and enforce access controls for sensitive data based on user role, device context and application use.&lt;/li&gt; 
  &lt;li&gt;Maintain visibility into how &lt;a href="https://www.techtarget.com/searchcontentmanagement/feature/Compare-information-governance-vs-records-management"&gt;data is accessed, transmitted and stored&lt;/a&gt; on mobile devices.&lt;/li&gt; 
  &lt;li&gt;Support audit and reporting requirements that demonstrate policy enforcement and access governance.&lt;/li&gt; 
  &lt;li&gt;Enable incident response processes that can contain, investigate and remediate mobile-related data exposure.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Mobile environments make these requirements harder to meet because access is distributed across managed and personal devices, cloud-based applications and external networks. As a result, compliance efforts must focus on governing access and behavior rather than relying solely on device ownership or perimeter controls.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/security-hipaa_compliance-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/security-hipaa_compliance-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/security-hipaa_compliance-f_mobile.png 960w,https://www.techtarget.com/rms/onlineImages/security-hipaa_compliance-f.png 1280w" alt="Illustration showing mobile compliance controls for protecting sensitive data, including access governance, training and monitoring" height="310" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Mobile compliance requires governing how sensitive data is accessed, monitored and audited across devices, applications and users.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Why is mobile compliance so difficult to manage?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why is mobile compliance so difficult to manage?&lt;/h2&gt;
 &lt;p&gt;Mobile compliance is difficult to manage because organizations often lack consistent visibility and enforcement across the mobile device fleet. Unlike traditional endpoints, mobile devices operate across mixed ownership models, diverse operating systems and rapidly changing application environments.&lt;/p&gt;
 &lt;p&gt;In many cases, organizations cannot easily answer basic compliance questions, such as which users can access sensitive data from mobile devices, which applications are involved and whether access policies are enforced consistently over time. This lack of clarity becomes a serious issue during audits or incident response, when organizations must demonstrate how access was governed rather than simply assert that controls existed.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="What can IT do to meet mobile compliance regulations?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What can IT do to meet mobile compliance regulations?&lt;/h2&gt;
 &lt;p&gt;Meeting mobile compliance requirements requires more than deploying security tools. Organizations must establish clear governance over how mobile devices access sensitive data, how policies are enforced across ownership models and how compliance is demonstrated over time. The following practices focus on aligning policy, access controls and operational oversight across the mobile environment.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/security-ccpa_compliance-h.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/security-ccpa_compliance-h_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/security-ccpa_compliance-h_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineImages/security-ccpa_compliance-h.png 1280w" alt="Illustration showing privacy compliance controls for mobile devices, including data access rules, consent handling and monitoring" height="358" width="279"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Privacy regulations require organizations to demonstrate how mobile access to personal data is controlled and enforced across managed and personal devices.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;Establish and enforce an organization-wide mobile policy&lt;/h3&gt;
 &lt;p&gt;To meet regulatory requirements and reduce mobile risk, organizations should establish a clearly defined, organization-wide mobile policy. This policy should govern how sensitive data can be accessed from mobile devices, which applications and services are permitted, and how authentication and authorization are enforced across different device types and ownership models.&lt;/p&gt;
 &lt;p&gt;Enforcing these policies typically requires organizations to use mobile device management (&lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management"&gt;MDM&lt;/a&gt;), enterprise mobility management (&lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/enterprise-mobility-management-EMM"&gt;EMM&lt;/a&gt;) or unified endpoint management (&lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/unified-endpoint-management-UEM"&gt;UEM&lt;/a&gt;) platforms to apply controls and maintain visibility across the mobile environment. These tools &lt;a href="https://www.techtarget.com/searchenterprisedesktop/feature/Understand-how-UEM-EMM-and-MDM-differ-from-one-another"&gt;support policy enforcement, monitoring and response&lt;/a&gt;, but they are effective only when aligned with clearly defined governance requirements.&lt;/p&gt;
 &lt;p&gt;IT departments in highly regulated industries may already have portions of this structure in place. In some cases, organizations manage mobile compliance internally. In others, they rely on third-party mobility managed services providers (&lt;a href="https://www.techtarget.com/searchitchannel/definition/managed-service-provider"&gt;MSPs&lt;/a&gt;) with experience supporting regulatory and audit requirements.&lt;/p&gt;
 &lt;h3&gt;Implement an effective mobile security strategy across the device fleet&lt;/h3&gt;
 &lt;p&gt;Mobile devices are at a higher risk of theft, loss or compromise in hybrid and remote work scenarios, thus putting sensitive corporate data at risk. Use an MDM platform to provide a standard level of encryption, secure authentication and remote wipe capabilities.&lt;/p&gt;
 &lt;p&gt;Managing corporate-owned devices makes implementing an effective strategy easier. &lt;a href="https://www.techtarget.com/searchmobilecomputing/tip/3-BYOD-security-risks-and-how-to-prevent-them"&gt;Managing the compliance of BYOD endpoints&lt;/a&gt; becomes more challenging due to the diversity of configurations, mobile OSes and app versions across user devices. The only way to preempt these challenges is to spend the extra time to put in a support structure for BYOD, starting with device requirements governed by MDM policies to help ensure mobile compliance by the authorization of devices.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/ilLEdbfzw-I?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;h3&gt;Institute a compliance plan for mobile users&lt;/h3&gt;
 &lt;p&gt;Organizations without an internal compliance plan for mobile users should either build one, seek guidance from a consulting group familiar with compliance requirements or outsource mobile governance to a specialized provider. Enforcement actions over the past decade highlight how recurring gaps in mobile governance and policy enforcement have led to compliance failures across industries.&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Jam City was fined $1.4 million in 2025 by California's Attorney General for alleged violations of the California Consumer Privacy Act (&lt;a href="https://www.techtarget.com/searchcio/definition/California-Consumer-Privacy-Act-CCPA"&gt;CCPA&lt;/a&gt;), including failures to honor opt-out requests and improper data sharing.&lt;/li&gt; 
  &lt;li&gt;Uber was fined €290 million in 2024 by the Dutch Data Protection Authority for GDPR violations related to unlawful transfers of European drivers' personal data to U.S. servers.&lt;/li&gt; 
  &lt;li&gt;Zoom was found to share users' personal data with Facebook without user consent, violating HIPAA regulations. In 2021, Zoom paid $85 million for failing to comply with HIPAA regulations. Allegations included Zoom sharing users' personal information with Facebook and Google without user consent and lying about its encryption practices.&lt;/li&gt; 
  &lt;li&gt;WhatsApp was fined $267 million in 2021 for violating GDPR related to a May 25, 2018, update to its Terms of Service.&lt;/li&gt; 
  &lt;li&gt;Bank of America, Barclays and Morgan Stanley are among the banks that have disclosed agreements to pay as much as $200 million because of employee use of unapproved messaging apps.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Also, the Attorney General of the State of California announced an &lt;a target="_blank" href="https://oag.ca.gov/news/press-releases/ahead-data-privacy-day-attorney-general-bonta-focuses-mobile-applications%E2%80%99" rel="noopener"&gt;investigative sweep&lt;/a&gt; in January 2023 focusing on mobile app compliance. They sent letters to businesses in the retail, travel and food services industries that allegedly failed to comply with the CCPA -- in particular, consumer opt-out requests or consumers who wanted to stop the sale of their data.&lt;/p&gt;
 &lt;h3&gt;Regularly monitor and update software and devices&lt;/h3&gt;
 &lt;p&gt;Just as IT teams must monitor and update the software, PCs and servers that comprise the corporate network, IT must extend a &lt;a href="https://www.techtarget.com/searchmobilecomputing/tip/Enterprise-mobile-compliance-is-critical-but-often-neglected"&gt;similar strategy over the corporate-owned and BYOD endpoints&lt;/a&gt; and software that interact with IT infrastructure and back-end systems to ensure security and compliance.&lt;/p&gt;
 &lt;p&gt;A useful reference point for mobile compliance best practices comes from the PCI Security Standards Council, the global body responsible for developing and maintaining payment security standards. The council's Mobile Payments on Commercial Off-The-Shelf (MPoC) Standard, most recently updated in late 2024, outlines &lt;a href="https://www.pcisecuritystandards.org/standards/mobile-payments-on-cots-mpo" target="_blank" rel="noopener"&gt;modern security requirements&lt;/a&gt; for accepting payments on smartphones and other commercial mobile devices. MPoC reflects current mobile payment models and has effectively superseded earlier guideline-style publications, including the PCI Mobile Payment Acceptance Security Guidelines.&lt;/p&gt;
 &lt;h3&gt;Maintain accurate records&lt;/h3&gt;
 &lt;p&gt;Managing the mobile device lifecycle with its accurate records is a necessity in meeting mobile compliance regulations. Records include tracking which devices an organization issues to employees, which employees have access to sensitive corporate data, and what security measures are on employee devices.&lt;/p&gt;
 &lt;h3&gt;Deliver ongoing mobile security training to all users&lt;/h3&gt;
 &lt;p&gt;Hybrid and remote work require organizations to rethink how they educate their users about mobile security and compliance. &lt;a href="https://www.techtarget.com/searchmobilecomputing/The-ultimate-guide-to-mobile-device-security-in-the-workplace"&gt;Mobile device security&lt;/a&gt; can no longer be a module in an online security awareness training course that's fluffy, with little regard to specifics for the organization, leading employees to blow through the course so they can email their manager a PDF certificate.&lt;/p&gt;
 &lt;p&gt;Mobile security training in the hybrid and remote work era requires the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Dedicated mobile device training starting from the time of employee onboarding that focuses on security and compliance.&lt;/li&gt; 
  &lt;li&gt;Publication and dissemination of mobile security-focused job aids and documentation through channels such as Notion or other centralized platforms.&lt;/li&gt; 
  &lt;li&gt;Mobile security becoming part of team meetings and asynchronous communication channels such as Slack.&lt;/li&gt; 
  &lt;li&gt;"Just-in-time" mobile security training as new threats surface in the industry or as the mobile security strategy changes.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Take mobile compliance seriously&lt;/h3&gt;
 &lt;p&gt;Mobile compliance is no longer a secondary concern or a problem limited to highly regulated industries. As mobile devices become primary access points for sensitive data, organizations must be able to demonstrate how access is governed, monitored and reviewed across the mobile environment.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    Mobile compliance depends on governing how sensitive data is accessed, monitored and reviewed across devices and applications.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;Sustainable mobile compliance depends on clear policies, consistent enforcement and ongoing visibility into how devices, applications and users interact with sensitive data. Organizations that treat mobile compliance as a governance responsibility rather than a one-time security project are better positioned to meet regulatory expectations, support audits and adapt as mobile platforms and regulations evolve.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note&lt;/b&gt;&lt;strong&gt;:&lt;/strong&gt; This article was updated in January 2026 to improve the reader experience.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Will Kelly is a freelance writer and content strategist who has written about cloud, DevOps, AI and enterprise mobility.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Jack Gold is the founder and president of J.Gold Associates, LLC and has been a technology analyst for more than 20 years.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Mobile compliance now requires governance over how sensitive data is accessed across managed and personal devices. Here are practical steps for sustainable enterprise compliance.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/customer_service04.jpg</image>
            <link>https://www.techtarget.com/searchmobilecomputing/tip/Enterprise-mobile-compliance-is-critical-but-often-neglected</link>
            <pubDate>Mon, 26 Jan 2026 10:00:00 GMT</pubDate>
            <title>How to address mobile compliance in a business setting</title>
        </item>
        <item>
            <body>&lt;p&gt;Information security management encompasses many areas -- from perimeter protection and encryption to application security and disaster recovery. IT security is made more challenging by compliance regulations and standards, such as &lt;a href="https://www.techtarget.com/searchhealthit/definition/HIPAA"&gt;HIPAA&lt;/a&gt;, PCI DSS , the Sarbanes-Oxley Act and &lt;a href="https://www.techtarget.com/whatis/definition/General-Data-Protection-Regulation-GDPR"&gt;GDPR&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;This is where IT security frameworks and standards are essential. Knowledge of regulations, standards and frameworks is necessary for all cybersecurity professionals. Compliance with these frameworks and standards is especially important from an audit perspective.&lt;/p&gt; 
&lt;p&gt;To help manage the process, let's examine standards, regulations and frameworks, as well as the more popular security options and how to use them.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What are IT security standards, regulations and frameworks?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are IT security standards, regulations and frameworks?&lt;/h2&gt;
 &lt;p&gt;&lt;b&gt;Standards&lt;/b&gt; are like recipes; they list steps to follow. A well-managed IT organization must comply with the requirements set forth in a standard.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Regulations&lt;/b&gt;, in contrast, have a legally binding impact. The way they describe how to do something indicates government and public support for the rules and processes set forth in the regulation. Failure to comply with IT-focused regulations can result in financial penalties and litigation.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Frameworks&lt;/b&gt; detail how to develop, test, execute and maintain something. A cybersecurity framework is a series of documented processes that defines policies and procedures for implementing and managing infosec controls. Such frameworks are a blueprint for managing risk and reducing vulnerabilities.&lt;/p&gt;
 &lt;p&gt;Information security professionals use frameworks to define and prioritize the tasks required to manage enterprise security. Frameworks also help prepare for compliance and other IT audits. Therefore, they must support specific requirements defined in a standard or regulation.&lt;/p&gt;
 &lt;p&gt;Organizations can customize frameworks to solve specific information security problems, such as industry-specific requirements or regulatory compliance goals. Frameworks also come in varying degrees of complexity and scale. Today's frameworks often overlap, so it's important to select ones that effectively support operational, compliance and audit requirements. They should also be easy to adapt to existing security activities.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Why are security frameworks important?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why are security frameworks important?&lt;/h2&gt;
 &lt;p&gt;Frameworks provide a starting point for establishing processes, policies and administrative activities for infosec management.&lt;/p&gt;
 &lt;p&gt;Security requirements often overlap, resulting in "crosswalks" that can be used to demonstrate compliance with different regulatory standards. For example, &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-write-an-information-security-policy-plus-templates"&gt;&lt;i&gt;information security policy&lt;/i&gt;&lt;/a&gt; is defined in the following standards:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;ISO 27002 defines it in Section 5.&lt;/li&gt; 
  &lt;li&gt;Control Objectives for Information and Related Technology (COBIT) defines it in the "Align, Plan and Organize" section.&lt;/li&gt; 
  &lt;li&gt;HIPAA defines it in the "Assigned Security Responsibility" section.&lt;/li&gt; 
  &lt;li&gt;PCI DSS defines it in the "Maintain an Information Security Policy" section.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Using a common framework, such as ISO 27002, an organization can establish crosswalks to demonstrate compliance with multiple regulations, including HIPAA, &lt;a href="https://www.techtarget.com/searchcio/definition/Sarbanes-Oxley-Act"&gt;SOX&lt;/a&gt;, PCI DSS and the &lt;a href="https://www.techtarget.com/searchcio/definition/Gramm-Leach-Bliley-Act"&gt;Graham-Leach-Bliley Act&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Unlike standards and regulations, frameworks do not always have compliance requirements. For example, "ISO/IEC 27001:2022 Information security, cybersecurity and privacy protection -- Information security management systems -- Requirements" has specific compliance mandates, whereas "ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection -- Information security controls" does not.&lt;/p&gt;
 &lt;p&gt;After identifying a compliance requirement, security analysts should look for frameworks that help the organization comply with the primary standard or regulation. This is how ISO 27002 supports ISO 27001.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="How to choose an IT security framework"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to choose an IT security framework&lt;/h2&gt;
 &lt;p&gt;Multiple factors drive the choice to use a particular security framework, including industry or compliance requirements. Publicly traded companies, for example, might want to use COBIT to comply with SOX, while the healthcare sector might consider the HITRUST (Health Information Trust Alliance) framework to comply with the &lt;a href="https://www.techtarget.com/searchhealthit/definition/HITECH-Act"&gt;HITECH (Health Information Technology for Economic and Clinical Health) Act&lt;/a&gt;. The ISO 27000 series of information security standards and frameworks, by contrast, is applicable in public and private sectors.&lt;/p&gt;
 &lt;p&gt;ISO standards are often time-consuming to implement, but they are helpful when an organization needs to demonstrate its information security capabilities using ISO 27000 certification. While NIST Special Publication (SP) 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations is a standard required by U.S. federal agencies, any organization can use it to build a technology-specific information security plan.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Top IT security standards and frameworks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Top IT security standards and frameworks&lt;/h2&gt;
 &lt;p&gt;The following standards and frameworks help security professionals organize and manage an information security program. The only bad choice among these frameworks is not choosing any of them.&lt;/p&gt;
 &lt;h3&gt;1. ISO 27000 series&lt;/h3&gt;
 &lt;p&gt;The ISO 27000 series was developed by the International Organization for Standardization. It is a flexible cybersecurity framework that applies to organizations of all types and sizes.&lt;/p&gt;
 &lt;p&gt;The two primary standards -- ISO &lt;a href="https://www.techtarget.com/whatis/definition/ISO-27001"&gt;27001&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchsecurity/definition/ISO-27002-International-Organization-for-Standardization-27002"&gt;27002&lt;/a&gt; -- establish the requirements and procedures for creating an information security management system (&lt;a href="https://www.techtarget.com/whatis/definition/information-security-management-system-ISMS"&gt;ISMS&lt;/a&gt;). Having an ISMS is an important audit and compliance activity. ISO 27000 consists of an overview and vocabulary and defines ISMS requirements. ISO 27002 specifies the code of practice for developing ISMS controls.&lt;/p&gt;
 &lt;p&gt;Compliance with the ISO 27000 series of standards is established through audit and certification processes, typically provided by third-party organizations approved by ISO and other accredited agencies.&lt;/p&gt;
 &lt;p&gt;The ISO 27000 series has 60 standards that cover a broad spectrum of cybersecurity issues, including the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;ISO 27017 describes security controls for cloud environments.&lt;/li&gt; 
  &lt;li&gt;ISO 27018 addresses the protection of personally identifiable information (PII) in cloud computing.&lt;/li&gt; 
  &lt;li&gt;ISO 27031 provides guidance on business continuity and related activities.&lt;/li&gt; 
  &lt;li&gt;ISO 27037 addresses the collection and protection of digital evidence.&lt;/li&gt; 
  &lt;li&gt;ISO 27040 addresses storage security.&lt;/li&gt; 
  &lt;li&gt;ISO 27400 covers IoT security and privacy.&lt;/li&gt; 
  &lt;li&gt;ISO 27799 defines information security in healthcare.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;2. NIST SP 800-53&lt;/h3&gt;
 &lt;p&gt;NIST has developed an extensive library of IT standards, many of which focus on information security. First published in 1990, the NIST SP 800 series addresses virtually every aspect of information security, with an increasing focus on &lt;a href="https://www.techtarget.com/searchsecurity/feature/Guide-to-cloud-security-management-and-best-practices"&gt;cloud security&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations is the information security benchmark for U.S. government agencies and is widely used in the private sector. It has helped spur the development of information security frameworks, including the NIST Cybersecurity Framework (CSF).&lt;/p&gt;
 &lt;h3&gt;3. NIST SP 800-171&lt;/h3&gt;
 &lt;p&gt;SP 800-171 Rev. 3: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations has gained popularity due to requirements set by the U.S. Department of Defense regarding contractor compliance with security frameworks. Government contractors are a frequent target for cyberattacks due to their proximity to federal systems. To bid on federal and state business opportunities, &amp;nbsp;manufacturers and subcontractors must have a cybersecurity framework.&lt;/p&gt;
 &lt;p&gt;Controls included in the SP 800-171 framework are directly related to SP 800-53 but are less detailed and more generalized. It's possible to build a crosswalk between the two standards if an organization must show compliance with SP 800-53, using SP 800-171 as the base. This creates flexibility for smaller organizations -- they can show compliance as they grow using the additional controls included in SP 800-53.&lt;/p&gt;
 &lt;h3&gt;4. NIST CSF&lt;/h3&gt;
 &lt;p&gt;The NIST Framework for Improving Critical Infrastructure Cybersecurity, later known as the &lt;a href="https://www.techtarget.com/searchsecurity/definition/NIST-Cybersecurity-Framework"&gt;NIST CSF&lt;/a&gt;, was developed under Executive Order 13636, released in 2013. It was created to address U.S. critical infrastructure, including energy production, water supplies, food supplies, communications, healthcare delivery and transportation. These industries must maintain a high level of preparedness because they have all been targeted by nation-state actors.&lt;/p&gt;
 &lt;p&gt;Unlike other NIST frameworks, the CSF focuses on cybersecurity risk analysis and risk management. Security controls in the framework are based on the five phases of risk management: identify, protect, detect, respond and recover. Like all IT security programs, these phases require the support of senior management. NIST CSF is suitable for both public and private sectors.&lt;/p&gt;
 &lt;p&gt;The CSF 2.0, released in 2024, &lt;a target="_blank" href="https://www.darkreading.com/ics-ot-security/nist-cybersecurity-framework-2-0-4-steps-get-started" rel="noopener"&gt;broadened the framework's applicability&lt;/a&gt; to organizations of all sizes, expanded its response core function activities, added a new core function to emphasize the importance of governance, and made ransomware and supply chain threats more prominent.&lt;/p&gt;
 &lt;h3&gt;5. NIST SP 1800 series&lt;/h3&gt;
 &lt;p&gt;The NIST SP 1800 series, also known as the NIST Cybersecurity Practice Guides, is a set of documents that complement the SP 800 series of standards and frameworks. The guides offer information on how to implement and apply standards-based cybersecurity technologies in real-world applications.&lt;/p&gt;
 &lt;p&gt;The SP 1800 series publications provide the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Examples of specific situations and capabilities.&lt;/li&gt; 
  &lt;li&gt;Experience-based, how-to approaches using multiple products to achieve the desired result.&lt;/li&gt; 
  &lt;li&gt;Modular implementation guidance on capabilities for organizations of all sizes.&lt;/li&gt; 
  &lt;li&gt;Specifications of required components and installation, configuration and integration information so organizations can easily replicate the process themselves.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Guides include implementing &lt;a href="https://www.techtarget.com/searchsecurity/definition/zero-trust-model-zero-trust-network"&gt;zero trust&lt;/a&gt;, &lt;a href="https://www.techtarget.com/searchsecurity/tip/Shift-left-with-these-DevSecOps-best-practices"&gt;DevSecOps practices&lt;/a&gt;, mobile device security, &lt;a href="https://www.techtarget.com/searchsecurity/tip/What-to-know-about-5G-security-threats-in-the-enterprise"&gt;5G security&lt;/a&gt; and data confidentiality.&lt;/p&gt;
 &lt;h3&gt;6. COBIT&lt;/h3&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchsecurity/definition/COBIT"&gt;COBIT&lt;/a&gt; was developed in the mid-1990s by ISACA, an independent organization of IT governance professionals. ISACA offers the well-known Certified Information Systems Auditor and Certified Information Security Manager certifications.&lt;/p&gt;
 &lt;p&gt;COBIT originally focused on reducing IT risks. COBIT 5, released in 2012, included new technology and business trends to help organizations balance IT and business goals. The current version is COBIT 2019. It's the most used framework to achieve SOX compliance. Numerous publications and professional certifications address COBIT requirements.&lt;/p&gt;
 &lt;h3&gt;7. CIS Controls&lt;/h3&gt;
 &lt;p&gt;The Center for Internet Security (CIS) Critical Security Controls, Version 8.1 -- formerly the SANS Top 20 -- lists technical security and operational controls that can apply to any environment. It does not address risk analysis or risk management like NIST CSF; rather, it solely focuses on reducing risk and &lt;a href="https://www.techtarget.com/searchsecurity/tip/Build-a-strong-cyber-resilience-strategy-with-existing-tools"&gt;increasing resilience&lt;/a&gt; for technical infrastructures. It was updated in 2024 to align with the updated NIST CSF 2.0.&lt;/p&gt;
 &lt;p&gt;The 18 CIS Controls include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Inventory and control of enterprise assets.&lt;/li&gt; 
  &lt;li&gt;Data protection.&lt;/li&gt; 
  &lt;li&gt;Audit log management.&lt;/li&gt; 
  &lt;li&gt;Malware defenses.&lt;/li&gt; 
  &lt;li&gt;Penetration testing.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;CIS Controls link with existing risk management frameworks to help remediate identified risks. They're useful resources for IT departments that lack technical security experience.&lt;/p&gt;
 &lt;h3&gt;8. HITRUST Common Security Framework&lt;/h3&gt;
 &lt;p&gt;The HITRUST Common Security Framework (CSF) includes risk analysis and risk management frameworks, along with operational requirements. The framework has 14 different control categories and applies to almost any organization, including healthcare. Categories include access control, HR security, risk management, physical and environmental security, and privacy practices.&lt;/p&gt;
 &lt;p&gt;The HITRUST CSF is a massive undertaking due to the heavy weight given to documentation and processes. As a result, many organizations end up scoping smaller areas of focus for HITRUST. The costs of obtaining and maintaining HITRUST certification add to the level of effort required to adopt this framework. The certification is audited by a third party, which adds a level of validity.&lt;/p&gt;
 &lt;h3&gt;9. GDPR&lt;/h3&gt;
 &lt;p&gt;The EU's GDPR is a framework of security requirements that global organizations must implement to protect the security and privacy of EU citizens' personal information.&lt;/p&gt;
 &lt;p&gt;GDPR requirements include controls for restricting unauthorized access to stored data and access control measures, such as the &lt;a href="https://www.techtarget.com/searchsecurity/definition/principle-of-least-privilege-POLP"&gt;principle of least privilege&lt;/a&gt;, role-based access and MFA. Failure to comply with GDPR requirements can result in significant fines.&lt;/p&gt;
 &lt;h3&gt;10. COSO&lt;/h3&gt;
 &lt;p&gt;The Committee of Sponsoring Organizations of the Treadway Commission is a joint initiative of five professional associations that has published two complementary frameworks. Its &lt;a href="https://www.techtarget.com/searchcio/definition/COSO-Framework"&gt;Internal Control -- Integrated Framework&lt;/a&gt;, released in 1992 and updated in 2013, helps companies achieve a risk-based approach for internal controls. It covers the following components, referred to as the five pillars:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;Control environment.&lt;/li&gt; 
  &lt;li&gt;Risk assessment.&lt;/li&gt; 
  &lt;li&gt;Control activities.&lt;/li&gt; 
  &lt;li&gt;Information and communication.&lt;/li&gt; 
  &lt;li&gt;Monitoring activities.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;COSO is developing a Corporate Governance Framework in collaboration with the National Association of Corporate Directors. The framework, expected to be released in late 2025, aims to unify existing corporate governance activities in U.S. public companies. It will complement existing COSO frameworks, including its Enterprise Risk Management Framework.&lt;/p&gt;
 &lt;h3&gt;11. PCI DSS&lt;/h3&gt;
 &lt;p&gt;PCI DSS is a set of requirements and guidelines designed to help ensure secure business transactions and protect cardholder data, including credit card numbers, expiration dates and security codes.&lt;/p&gt;
 &lt;p&gt;The 12 PCI DSS requirements include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Install and maintain network security controls.&lt;/li&gt; 
  &lt;li&gt;Protect stored account data.&lt;/li&gt; 
  &lt;li&gt;Develop and maintain secure systems and software.&lt;/li&gt; 
  &lt;li&gt;Test system and network security regularly.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Created in 2004 by five major credit card companies and updated to version 4.0 in 2022, it called for more rigorous security measures, such as MFA and strong passwords. Version 4.0.1, released in 2024, did not add or remove requirements but &lt;a target="_blank" href="https://www.darkreading.com/cyber-risk/new-pci-dss-rules-merchants-on-hook-compliance" rel="noopener"&gt;clarified existing requirements and updated terminology&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;12. CMMC&lt;/h3&gt;
 &lt;p&gt;The Cybersecurity Maturity Model Certification is a framework developed by the U.S. Department of Defense to ensure government-approved contractors comply with cybersecurity requirements. It is built on the controls and guidance in NIST SP 171: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, and defines the following three certification levels:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Foundational, minimum security requirements for basic government contracting.&lt;/li&gt; 
  &lt;li&gt;Advanced, for contractors that handle controlled unclassified information.&lt;/li&gt; 
  &lt;li&gt;Expert, for contractors handling highly classified information.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;CMMC 1.0 was released in 2020. Version 2.0 was finalized in 2024.&lt;/p&gt;
 &lt;h3&gt;13. FISMA&lt;/h3&gt;
 &lt;p&gt;The &lt;a href="https://www.techtarget.com/searchsecurity/definition/Federal-Information-Security-Management-Act"&gt;Federal Information Security Modernization Act&lt;/a&gt;, which aligns closely with the NIST Risk Management Framework, provides a security framework for protecting federal government data and systems.&lt;/p&gt;
 &lt;p&gt;FISMA requires U.S. federal agencies, as well as third parties, contractors and vendors that handle federal systems, to develop, document and implement security programs. Compliance requirements include continuous monitoring, annual security reviews and baseline security controls, such as those outlined in NIST SP 800-53.&lt;/p&gt;
 &lt;p&gt;FISMA was introduced in 2002 and updated in 2014. It is currently undergoing legislative efforts for an update.&lt;/p&gt;
 &lt;h3&gt;14. NERC CIP&lt;/h3&gt;
 &lt;p&gt;The &lt;a href="https://www.techtarget.com/searchsecurity/definition/North-American-Electric-Reliability-Corporation-Critical-Infrastructure-Protection-NERC-CIP"&gt;North American Electric Reliability Corporation Critical Infrastructure Protection framework&lt;/a&gt; includes 14 ratified and proposed standards that apply to utility companies within the bulk power system. The standards outline recommended controls and policies to monitor, regulate, manage and maintain the security of critical infrastructure systems. Bulk power system owners, operators and users must comply with the NERC CIP framework.&lt;/p&gt;
 &lt;p&gt;CIP standards include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;CIP-004-7 Cyber Security -- Personnel and Training.&lt;/li&gt; 
  &lt;li&gt;CIP-008-6 Cyber Security -- Incident Reporting and Response Planning.&lt;/li&gt; 
  &lt;li&gt;CIP-013-2 Cyber Security -- Supply Chain Risk Management.&lt;/li&gt; 
  &lt;li&gt;CIP-014-3 Physical Security.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;15. SOC 2&lt;/h3&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchsecurity/definition/Soc-2-Service-Organization-Control-2"&gt;System and Organizational Controls 2&lt;/a&gt; is a framework developed by the American Institute of Certified Public Accountants that assesses how organizations manage and protect data. It is an internal control that enables companies to demonstrate that they meet the following Trust Services Criteria:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Security.&lt;/b&gt; Protects data and maintains its privacy during creation, use, processing, transmission and storage. Focuses on preventing data leakage, unauthorized access and damage to systems that affect the availability, integrity and confidentiality of data.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Availability.&lt;/b&gt; Puts controls in place that ensure systems are operational, available and monitored.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Processing integrity.&lt;/b&gt; Confirms that processing is complete, accurate, timely, authorized and secure.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Confidentiality.&lt;/b&gt; Protects data designated confidential.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Privacy.&lt;/b&gt; Ensures PII is collected, used, retained, disclosed and disposed of properly.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;A SOC 2 audit, performed by a third-party CPA, examines whether an organization's controls meet SOC 2 criteria. While not a legal requirement, many customers use it to assess the security and privacy controls of their vendors and service providers.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Paul Kirvan, FBCI, CISA, is an independent consultant and technical writer with more than 35 years of experience in business continuity, disaster recovery, resilience, cybersecurity, GRC, telecom and technical writing.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Several IT security frameworks and standards exist to help protect company data. Here's advice for choosing the right ones for your organization.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_a299192530.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/tip/IT-security-frameworks-and-standards-Choosing-the-right-one</link>
            <pubDate>Wed, 08 Oct 2025 09:00:00 GMT</pubDate>
            <title>Top 15 IT security frameworks and standards explained</title>
        </item>
        <item>
            <body>&lt;p&gt;Large language models, such as ChatGPT, Gemini and Claude, are redefining how people obtain information and perform their daily tasks. The cybersecurity industry is no different. Teams are using LLMs for everything from security operations center automation to defending against phishing attacks, security awareness and everything in between.&lt;/p&gt; 
&lt;p&gt;One particular area where LLMs shine is helping practitioners analyze the security of applications -- specifically in supporting &lt;a href="https://www.techtarget.com/searchsecurity/tip/Red-team-vs-blue-team-vs-purple-team-Whats-the-difference"&gt;red team activities&lt;/a&gt;. LLM-based tools and plugins are already paying benefits. Among them are ones that analyze HTTP stream information -- e.g., via context menu -- exported from testing apps such as Burp Suite or Zed Attack Proxy (ZAP), and tools that sit in the proxy chain to bulk offload requests and responses for LLM review.&lt;/p&gt; 
&lt;p&gt;Even without special-purpose tools, though, the human-readable nature of HTTP, combined with its predictable structure, makes it particularly well suited for LLM analysis. Yet, as with anything related to new technology, it can be difficult to know where and how to start. To that end, let's examine a few ways to use LLMs for penetration testing.&lt;/p&gt; 
&lt;p&gt;But first, here are a couple quick caveats:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;Be aware of both terms of service and guardrails. Each LLM might have different rules about what is allowed and what constitutes acceptable use. Stay informed of those constraints to ensure you adhere to them. Some LLMs have guardrails that gate use even if you're following the rules. Others might filter information they decide could potentially be sensitive in a different context -- for example, non-authentication fields within a JSON Web Token (JWT).&lt;/li&gt; 
 &lt;li&gt;The five use cases detailed below are not intended to be exhaustive; these are not the only potential deployments. The ones included are generally applicable under most test conditions and because they reliably add significant value. You might have needs or circumstances not covered here.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;section class="section main-article-chapter" data-menu-title="1. Session state and login flow"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;1. Session state and login flow&lt;/h2&gt;
 &lt;p&gt;Analyzing application state maintenance is a great way to use an LLM for pen testing. The model can help establish state -- such as login flow -- as well as artifacts used to maintain it, among them &lt;a href="https://www.techtarget.com/searchsecurity/definition/SAML"&gt;Security Assertion Markup Language&lt;/a&gt; assertions, bearer tokens, universally unique identifiers, JWTs, session cookies and document object model artifacts.&lt;/p&gt;
 &lt;p&gt;It's not always easy for humans to decode this. Cutting and pasting raw request and response blocks, such as headers and request/response bodies, to login requests can provide quite a bit of useful information. Even when practitioners can't just cut and paste one request -- for example, when login exchanges span multiple requests -- they can still get value here. &lt;a href="https://www.techtarget.com/whatis/feature/17-free-cybersecurity-tools-you-should-know-about"&gt;ZAP, Burp and other popular tools&lt;/a&gt; let professionals export these as text files or HTTP archive files that the LLM can analyze later.&lt;/p&gt;
 &lt;p&gt;One important note: While most reasoning models can unpack and analyze even encoded artifacts -- for example, URL encoded, Base64 encoded or hex encoded -- more complex data structures and multiple levels of encoding can increase the chance that the &lt;a href="https://www.techtarget.com/whatis/definition/AI-hallucination"&gt;LLM will hallucinate&lt;/a&gt; and provide inaccurate data. The phenomenon is particularly true within smaller and self-hosted reasoning models.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="2. Reverse-engineering site composition"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;2. Reverse-engineering site composition&lt;/h2&gt;
 &lt;p&gt;Login and state maintenance ranks first in this list because it is where many issues can occur. Consider how many of the OWASP Top 10 -- and in particular, its &lt;a target="_blank" href="https://owasp.org/API-Security/editions/2023/en/0x11-t10/" rel="noopener"&gt;API Top 10&lt;/a&gt; -- relate to authentication, authorization and state. That said, state maintenance likely isn't the most commonly performed task. That honor goes to identifying site architecture and construction -- a step required during each pen test, and in many cases, for multiple components in each test.&lt;/p&gt;
 &lt;p&gt;LLMs can play a significant role here: A multitude of potential combinations define how a given site is built. Sites can have a mix of different application scaffolding strategies, middleware, PaaS, APIs, languages and other factors. It's almost impossible for any individual tester, no matter how experienced, to recognize them all at a glance. A tester might today work with a React front end and Scala-based Play Framework back end, and tomorrow wrestle with a GraphQL-heavy Node app on Django.&lt;/p&gt;
 &lt;p&gt;It's a significant amount of work to reverse-engineer how a given application is built, understand how pieces fit together and research specific questions about its architecture. It's also a great opportunity to harness an LLM to make this task easier.&lt;/p&gt;
 &lt;p&gt;Supply an LLM with requests and responses along with &lt;a href="https://www.techtarget.com/whatis/feature/How-to-scrape-data-from-a-website"&gt;scraped data&lt;/a&gt; from the site -- for example, a capture of the HTTP stream, output from Wget or Playwright, etc. -- via retrieval-augmented generation. It could be part of project files in a commercial LLM or as part of local data files in an internally hosted model.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="3. Identifying legacy components"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3. Identifying legacy components&lt;/h2&gt;
 &lt;p&gt;Using an LLM for pen testing also helps those looking for problematic, legacy, vulnerable or sunsetted components within an application. Consider a site built on WordPress. Identifying which plugins and themes are in use and cross-referencing them with vulnerable versions can be a pain, even if using special-purpose tools such as WPScan.&lt;/p&gt;
 &lt;p&gt;And that's just WordPress. Similar potential issues occur with almost every page. Legacy versions of libraries such as jQuery, Angular or Handlebars -- not to mention smaller or special-purpose libraries -- can be a significant security headache. An LLM can help identify those that are out of date and, more importantly, those that might present a possible &lt;a href="https://www.techtarget.com/searchsecurity/tip/Close-security-gaps-with-attack-path-analysis-and-management"&gt;attack path&lt;/a&gt; for the application.&lt;/p&gt;
 &lt;p&gt;LLMs are particularly effective here because they can pinpoint vulnerable versions of libraries more readily than a human can and without explicit version strings, such as those based on syntactic differences in how specific methods within the API are called or use of deprecated functions. An LLM might see a call to the &lt;samp&gt;.live()&lt;/samp&gt; method in jQuery and correctly note that this usage was deprecated. As a result, the version in use could be susceptible to live-based cross-site scripting attacks (XSS). The LLM gives in minutes what otherwise might take professionals hours to research -- or worse, potentially miss.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="4. Reverse-engineering minified code"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;4. Reverse-engineering minified code&lt;/h2&gt;
 &lt;p&gt;Minified code generates more hours of frustration than just about any other issue in the application space. For a time-bound test, unpacking and analyzing minified code is a major time sink and something many testers avoid unless absolutely necessary. Even then, time constraints -- for example, a test with a capped number of hours -- might prevent thoroughness.&lt;/p&gt;
 &lt;p&gt;While tools that help inflate and unpack minified code exist, in many cases, the expansion relates mostly to spacing. But it's still difficult to get back to something a person can read when variable and function names are left completely opaque. LLMs have no such constraint. They can help unpack and understand minified code in a way that is difficult to accomplish otherwise. For example, an LLM might identify a minified function that parses a JWT and returns &lt;samp&gt;user.admin&lt;/samp&gt; without checking the signature -- even if that function is named &lt;samp&gt;q()&lt;/samp&gt; and the variable names are meaningless.&lt;/p&gt;
 &lt;p&gt;Note that most LLMs, even smaller models, are accurate with standard libraries and frameworks. They are, however, more prone to hallucination with custom code that occurs only in the app being analyzed. To that end, while LLMs can yield beneficial baseline data, if reverse-engineering the minified code is central to an attack scenario a practitioner is undertaking, trust but verify.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="5. Payload crafting and mutation"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5. Payload crafting and mutation&lt;/h2&gt;
 &lt;p&gt;Humans are prone to burnout -- particularly when working during off-hour testing windows and after multiple solid hours of testing. Engineers can make mistakes when crafting payloads, coming up with &lt;a href="https://www.techtarget.com/searchsecurity/tip/Web-fuzzing-Everything-you-need-to-know"&gt;seeds for fuzzing&lt;/a&gt; and performing other testing procedures. Generative LLMs offer an alternative. A prompt such as "Generate an XSS payload to bypass React-based sanitizers and that will trigger on mouseover" can greatly assist testers validating exploitability. LLMs also offer help to those probing injection use cases -- among them SQLi, LDAP injection and XML injection -- as well as XSS, path traversal, JWT manipulation and other payloads.&lt;/p&gt;
 &lt;p&gt;Another important caveat: This type of use case pushes right up to the edge of what many commercial LLMs will allow through their guardrails. Expect a lot of pushback here, including a flat refusal to do it, unless practitioners have a locally hosted model or an enterprise LLM tier that lets them define their own policy thresholds. Even in cases where the LLM does block a response, there's still quite a bit of potential value in discussing methods with the LLM's creator -- in the abstract, if no more specificity is allowed -- to bypass filtering or encoding mechanisms.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&lt;i&gt; It is possible to use the use cases in this article both lawfully and unlawfully. It is up to you to ensure your usage is lawful. Get appropriate permission and approval before red teaming, and handle the information obtained ethically. If you are unsure whether your usage is lawful, do not proceed until you have confirmed that it is -- for example, by discussing and validating your planned usage with your organization's counsel.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Ed Moyle is a technical writer with more than 25 years of experience in information security. He is a partner at SecurityCurve, a consulting, research and education company.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Red teams can harness the power of LLMs for penetration testing. From session analysis to payload crafting, discover five ways AI transforms security testing.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/chatbot_g1206801125.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/tip/Red-teams-and-AI-Ways-to-use-LLMs-for-penetration-testing</link>
            <pubDate>Mon, 25 Aug 2025 12:00:00 GMT</pubDate>
            <title>Red teams and AI: 5 ways to use LLMs for penetration testing</title>
        </item>
        <item>
            <body>&lt;p&gt;Electric power is one of the most important resources to protect when it comes to critical infrastructure. Virtually every business can experience power loss, and the results can be disastrous.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.techtarget.com/searchdisasterrecovery/definition/business-continuity"&gt;Business continuity&lt;/a&gt; is an organization's ability to maintain critical business functions during and after a disruption. Power outages can strike at any moment, leading to extended downtime or data loss. Incorporating power outage preparedness into a business continuity plan can help when the lights go down.&lt;/p&gt; 
&lt;p&gt;A business continuity plan for power outages must be part of an organization's incident response protocols. Organizations can also take various measures to minimize the likelihood of power outages, such as infrastructure testing and ensuring ample backup power supply access.&lt;/p&gt; 
&lt;p&gt;This article update will cover the consequences of power loss, causes, and detailed steps to create and implement an outage recovery plan.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Consequences of power loss"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Consequences of power loss&lt;/h2&gt;
 &lt;p&gt;A loss of power can &lt;a href="https://www.techtarget.com/searchdisasterrecovery/Free-incident-response-plan-template-for-disaster-recovery-planners"&gt;shut down an entire business&lt;/a&gt; unless organizations take suitable precautions. A complete loss of commercial power is the worst-case scenario, as opposed to local and/or regional outages that are confined to specific locations. Extended outages can cause &lt;a href="https://www.techtarget.com/searchdisasterrecovery/tip/Real-life-business-continuity-failures-Examples-to-study"&gt;catastrophic business losses &lt;/a&gt;that might last hours, days or weeks.&lt;/p&gt;
 &lt;p&gt;Unplanned downtime due to power outage might result in the following, if not remedied quickly:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Data loss.&lt;/li&gt; 
  &lt;li&gt;Financial/legal troubles for not meeting compliance requirements.&lt;/li&gt; 
  &lt;li&gt;Reputational harm.&lt;/li&gt; 
  &lt;li&gt;Damage to critical systems.&lt;/li&gt; 
  &lt;li&gt;Employee injuries and even fatalities.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Causes of business power outages"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Causes of business power outages&lt;/h2&gt;
 &lt;p&gt;Events that are most likely to cause power outages are often associated with natural causes, such as severe weather. Naturally occurring events likely to cause power outages include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Tornadoes.&lt;/li&gt; 
  &lt;li&gt;Wildfires.&lt;/li&gt; 
  &lt;li&gt;Earthquakes.&lt;/li&gt; 
  &lt;li&gt;Flooding.&lt;/li&gt; 
  &lt;li&gt;Mudslides.&lt;/li&gt; 
  &lt;li&gt;Lightning strikes.&lt;/li&gt; 
  &lt;li&gt;Sinkholes.&lt;/li&gt; 
  &lt;li&gt;Solar flares and storms.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Outages can also be manmade, by error or malicious action. Disruptions caused by human activity can include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Flooding caused by damaged plumbing.&lt;/li&gt; 
  &lt;li&gt;Electrical damage caused by improper wiring or lack of grounding.&lt;/li&gt; 
  &lt;li&gt;Incorrect data entry or programming of power management systems.&lt;/li&gt; 
  &lt;li&gt;Failure of systems within the nation's electric grid.&lt;/li&gt; 
  &lt;li&gt;Damage to high-voltage overhead power lines and towers.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchdisasterrecovery/tip/Why-BCDR-teams-should-consider-EMP-disaster-recovery-plans"&gt;Electromagnetic pulses&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Damage to power cables by construction equipment.&lt;/li&gt; 
  &lt;li&gt;Incorrect power system installation.&lt;/li&gt; 
  &lt;li&gt;Insufficient fueling of backup power systems.&lt;/li&gt; 
  &lt;li&gt;Failure to regularly test backup power systems.&lt;/li&gt; 
  &lt;li&gt;Fire/arson.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/ZetTrqWFE_w?si=TnvyxSiYJ0RLIzpX?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="8 steps to design and implement a business continuity plan for power outages"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;8 steps to design and implement a business continuity plan for power outages&lt;/h2&gt;
 &lt;p&gt;Like most business continuity plans, several activities should occur before plan development begins. The following is a list of eight tasks IT teams and BCDR personnel must complete before implementing a plan.&lt;/p&gt;
 &lt;h3&gt;1. Secure senior management approval and funding&lt;/h3&gt;
 &lt;p&gt;Few, if any, business initiatives get off the ground if leadership is not on board, so it is critical to secure management approval early. Discussions with management will likely shape who is involved in a business continuity plan, as well as &lt;a href="https://www.techtarget.com/searchdisasterrecovery/A-disaster-recovery-budget-template-A-free-download-and-guide"&gt;determine the budget&lt;/a&gt;. This stage is an opportunity to make the case for investing in business continuity and evaluating power sources for potential outages.&lt;/p&gt;
 &lt;h3&gt;2. Establish a project team&lt;/h3&gt;
 &lt;p&gt;Depending on the size of the organization, the size of a &lt;a href="https://www.techtarget.com/searchdisasterrecovery/tip/Establish-a-business-continuity-team-to-get-the-full-picture"&gt;business continuity team&lt;/a&gt; varies. These teams are typically made up of IT personnel, with input from various department heads and HR. When creating a business continuity plan for power outages, members might also include internal facilities employees and external power professionals.&lt;/p&gt;
 &lt;h3&gt;3. Conduct a business impact analysis (BIA) and risk assessment&lt;/h3&gt;
 &lt;p&gt;Risks vary by organization, so it is critical that the business continuity team &lt;a href="https://www.techtarget.com/searchdisasterrecovery/feature/Using-a-business-impact-analysis-BIA-template-A-free-BIA-template-and-guide"&gt;conduct a business impact analysis&lt;/a&gt; (BIA) and risk assessment before creating a plan. A BIA will identify the severity of different risks and how badly they are likely to affect key business processes. For example, the analysis might show that a loss of electricity to a data center's power source would cause significant downtime, resulting in compliance violations or data loss. That finding would affect the structure of a business continuity plan, making sure that the power source is a high priority.&lt;/p&gt;
 &lt;p&gt;A &lt;a href="https://www.techtarget.com/searchsecurity/definition/risk-assessment"&gt;risk assessment&lt;/a&gt;, on the other hand, determines the likelihood of different risks that might affect operations. When it comes to a power outage plan, key risks to assess would be aging infrastructure, local weather patterns &lt;a target="_blank" href="https://www.energy.gov/articles/department-energy-releases-report-evaluating-us-grid-reliability-and-security" rel="noopener"&gt;and the reliability&lt;/a&gt; of the region's electric grid.&lt;/p&gt;
 &lt;h3&gt;4. Prepare a list of all power resources&lt;/h3&gt;
 &lt;p&gt;When an outage strikes, you don't want to be scrambling to find the electric company's contact information. For a power outage business continuity plan, make sure someone has a copy of or access to this information. This could be a member of the business continuity team or HR.&lt;/p&gt;
 &lt;p&gt;Organizations should have contact information for &lt;a href="https://www.techtarget.com/searchdatacenter/feature/Data-center-power-infrastructure-essentials-prevent-downtime"&gt;key power resources&lt;/a&gt;, which might include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Primary and alternate electric utility companies.&lt;/li&gt; 
  &lt;li&gt;Emergency power system vendors.&lt;/li&gt; 
  &lt;li&gt;Fuel companies for backup power systems.&lt;/li&gt; 
  &lt;li&gt;Electricians and specialized contractors.&lt;/li&gt; 
  &lt;li&gt;Access to power system engineers and consultants.&lt;/li&gt; 
  &lt;li&gt;Access to suppliers of power protection resources.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;5. Establish procedures for responding to power outages&lt;/h3&gt;
 &lt;p&gt;Statistically, the likelihood of a short-term power interruption is fairly high. Short-term outages can last about 15 minutes. They are nuisances, but will not likely disrupt business operations. By contrast, longer-term power outages, lasting hours or days, require a more intensive business recovery process.&lt;/p&gt;
 &lt;p&gt;Organizations must establish several key procedures for resolving power outages. While some of the technical details will differ by organization, two key elements should be top priorities: people and power.&lt;/p&gt;
 &lt;p&gt;Confirm that employees are unharmed and commence &lt;a target="_blank" href="https://www.ready.gov/evacuation" rel="noopener"&gt;evacuation of personnel&lt;/a&gt; as quickly as possible. Establish outside meeting locations where employees can gather, receive further instructions from management and first responders, and management can take headcounts of employees.&lt;/p&gt;
 &lt;p&gt;Launching emergency power systems can help keep the organization running, unless other circumstances necessitate a physical evacuation. &lt;a href="https://www.techtarget.com/searchdatacenter/tip/Data-center-backup-power-systems-standards-to-address-downtime"&gt;Backup power and remote working&lt;/a&gt; make sense so long as the outage is of a relatively short duration, and is largely confined to a specific geographic area, such as a city or section of a city, and is not a statewide or nationwide disruption.&lt;/p&gt;
 &lt;p&gt;For larger-area and extended power outages, the above strategies might be insufficient, so it is important to discuss short- and long-term power outage strategies periodically with senior management, facilities teams and utility companies.&lt;/p&gt;
 &lt;h3&gt;6. Establish recovery procedures post-outage&lt;/h3&gt;
 &lt;p&gt;Once power returns, the business will need time to recover and &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/System-Restore"&gt;restart systems&lt;/a&gt;, and reestablish &lt;a href="https://www.techtarget.com/searchdisasterrecovery/tip/How-to-maintain-network-continuity-in-a-DR-strategy"&gt;network connections&lt;/a&gt; and related activities. Check with building facilities personnel on the cause of the outage and determine remedial actions that can help prevent future occurrences.&lt;/p&gt;
 &lt;h3&gt;7. Establish and schedule testing activities&lt;/h3&gt;
 &lt;p&gt;Testing is key to any business continuity plan. &lt;a href="https://www.techtarget.com/searchdisasterrecovery/tip/Strengthen-a-business-continuity-plan-with-testing-exercises"&gt;IT teams must test&lt;/a&gt; incident response activities, backup and restore operations, and communications resources to make sure the company can return to business smoothly. When creating a business continuity plan for power outages, you must also consider physical infrastructures that might be affected and test their backup power systems.&lt;/p&gt;
 &lt;h3&gt;8. Schedule periodic assessments of power infrastructures&lt;/h3&gt;
 &lt;p&gt;Business continuity plans typically include strategies for power outage response and necessary resources. These include local backup power systems, spare power supplies for equipment racks and devices, spare power cables, power connectors and spare power outlets.&lt;/p&gt;
 &lt;p&gt;Periodically inspect the building infrastructure for power protection equipment, and be sure to include the following resources and strategies:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Lightning arrestors.&lt;/li&gt; 
  &lt;li&gt;Grounding.&lt;/li&gt; 
  &lt;li&gt;Power conditioners.&lt;/li&gt; 
  &lt;li&gt;Surge suppressors.&lt;/li&gt; 
  &lt;li&gt;Cabling with the proper rating for the intended usage.&lt;/li&gt; 
  &lt;li&gt;Backup power systems.&lt;/li&gt; 
  &lt;li&gt;Flashlights.&lt;/li&gt; 
  &lt;li&gt;Diverse cable routing in vertical and horizontal raceways and cable paths.&lt;/li&gt; 
  &lt;li&gt;Diverse power cable routing into the building.&lt;/li&gt; 
  &lt;li&gt;Service from two different utility power substations.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Make sure that emergency lighting is in place throughout each floor of the office and in stairwells. If an organization is a tenant in an office building or manufacturing facility, check with the facilities management team on their power protection activities.&lt;/p&gt;
&lt;/section&gt;                            
&lt;section class="section main-article-chapter" data-menu-title="Include power loss in BCDR and resilience plans"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Include power loss in BCDR and resilience plans&lt;/h2&gt;
 &lt;p&gt;Power loss is one of the principal risks and threats to business continuity. &lt;a href="https://www.techtarget.com/searchdisasterrecovery/feature/Sample-business-continuity-plan-template-for-SMBs-Free-download-and-guide"&gt;No matter the size&lt;/a&gt; or location of an organization, IT teams must prepare for several vulnerabilities to prevent or reduce the effects of potential power outages.&lt;/p&gt;
 &lt;p&gt;When developing BCDR, incident response and resilience plans, organizations must include power disruptions in risk assessments and BIAs. These analyses help identify ways to prepare for power outages and how to &lt;a href="https://www.techtarget.com/searchdisasterrecovery/tip/How-to-calculate-maximum-allowable-downtime"&gt;mitigate the severity of an outage to the business.&lt;/a&gt; These assessments will also show the organization the likelihood of different disruptions, helping them dedicate resources where they are needed most.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Paul Kirvan, FBCI, CISA, is an independent consultant and technical writer with more than 35 years of experience in business continuity, disaster recovery, resilience, cybersecurity, GRC, telecom and technical writing. &lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Loss of electric power presents a major risk to business continuity, and no organization is immune. Take these steps to create a solid business continuity plan for power outages.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/collab_a362306286.jpg</image>
            <link>https://www.techtarget.com/searchdisasterrecovery/tip/Make-a-power-outage-business-continuity-plan-with-these-tips</link>
            <pubDate>Tue, 19 Aug 2025 13:15:00 GMT</pubDate>
            <title>Building a power outage business continuity plan: Step by step</title>
        </item>
        <item>
            <body>&lt;p&gt;It was a banner week for cybercriminals and a challenging one for defenders. Hundreds of organizations saw threat actors exploit critical flaws in their Microsoft SharePoint servers, with more malicious hackers piling on and attacks still ongoing.&lt;/p&gt; 
&lt;p&gt;Meanwhile, just two months after a major FBI takedown, Lumma &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-protect-against-malware-as-a-service"&gt;malware-as-a-service&lt;/a&gt; operations not only appear to have fully recovered, but are stealthier and more effective than ever. And the innovative Coyote banking Trojan has broken new technical ground by weaponizing Windows accessibility features against users.&lt;/p&gt; 
&lt;p&gt;Together, these stories highlight the opportunism, adaptability, resilience and ingenuity of &lt;a href="https://www.techtarget.com/whatis/34-Cybersecurity-Statistics-to-Lose-Sleep-Over-in-2020"&gt;today's cyberthreats&lt;/a&gt; -- and the critical importance of countermeasures, such as &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-build-a-better-vulnerability-management-program"&gt;prompt patching&lt;/a&gt; and frequent &lt;a href="https://www.techtarget.com/searchsecurity/tip/Cybersecurity-employee-training-How-to-build-a-solid-plan"&gt;security awareness training&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;Read more about an eventful week in cybercrime.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Ongoing SharePoint attacks hit hundreds of Microsoft customers"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Ongoing SharePoint attacks hit hundreds of Microsoft customers&lt;/h2&gt;
 &lt;p&gt;Microsoft customers with on-premises SharePoint servers are facing a massive wave of ongoing cyberattacks that began in early July and escalated in the past week.&lt;/p&gt;
 &lt;p&gt;The intrusions exploit an attack chain dubbed ToolShell, a sequence combining remote code injection and network spoofing flaws. Attackers have reportedly used the vulnerabilities to compromise hundreds of SharePoint customers worldwide, including the &lt;a href="https://www.darkreading.com/cyberattacks-data-breaches/us-nuclear-agency-hacked-microsoft-sharepoint"&gt;U.S. National Nuclear Security Administration&lt;/a&gt; and the Department of Homeland Security.&lt;/p&gt;
 &lt;p&gt;According to Microsoft, three Chinese nation-state threat actors were &lt;a href="https://www.darkreading.com/application-security/3-china-nation-state-actors-sharepoint-bugs"&gt;among the first to initiate ToolShell attacks&lt;/a&gt; in early July. More recently, one of the groups also began using the vulnerability sequence in &lt;a href="https://www.darkreading.com/endpoint-security/ransomware-actors-toolshell-sharepoint-bugs"&gt;ongoing ransomware attacks&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Microsoft released an &lt;a href="https://www.darkreading.com/remote-workforce/microsoft-rushes-emergency-fix-exploited-sharepoint-toolshell-flaw"&gt;emergency out-of-band security update&lt;/a&gt; on July 19. The patch covers SharePoint Subscription Edition, SharePoint 2019 and SharePoint 2016. Researchers warned that more threat actors might join the ongoing attack campaign, making immediate patching critical for all SharePoint customers.&lt;/p&gt;
 &lt;p&gt;The vulnerabilities do not affect the Microsoft 365 version of SharePoint Online.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.cybersecuritydive.com/news/what-we-know-microsoft-sharepoint-attacks/753961/"&gt;&lt;i&gt;Read the full story by David Jones on Cybersecurity Dive&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Lumma stealer malware returns after FBI takedown"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Lumma stealer malware returns after FBI takedown&lt;/h2&gt;
 &lt;p&gt;The notorious &lt;a href="https://www.techtarget.com/searchsecurity/news/366566674/Google-researchers-in-dispute-over-account-hijacking-attacks"&gt;Lumma malware&lt;/a&gt; -- which aims to steal sensitive information, such as credentials and cryptocurrency wallet information -- has rapidly resurfaced following its FBI takedown in May. Trend Micro researchers said Lumma threat actors' activity appeared to have returned to normal levels between June and July, although their tactics have gotten stealthier and more discreet.&lt;/p&gt;
 &lt;p&gt;Previously, Lumma operators relied heavily on Cloudflare's infrastructure to hide their malicious domains. Now, however, they are increasingly turning to providers that are less beholden to U.S. law enforcement, such as Russia-based Selectel.&lt;/p&gt;
 &lt;p&gt;Lumma distribution methods are also evolving, with recent attacks using fake cracked software, ClickFix campaigns with deceptive CAPTCHA pages, AI-generated GitHub repositories, and social media campaigns on YouTube and Facebook.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.darkreading.com/endpoint-security/lumma-stealer-stealthier-than-ever"&gt;&lt;i&gt;Read the full story by Elizabeth Montalbano on Dark Reading&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Coyote breaks new ground by exploiting Windows UI Automation"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Coyote breaks new ground by exploiting Windows UI Automation&lt;/h2&gt;
 &lt;p&gt;The banking &lt;a href="https://www.techtarget.com/searchsecurity/definition/Trojan-horse"&gt;Trojan&lt;/a&gt; Coyote, active in Latin America since February 2024, has pioneered a new attack method by exploiting the Windows UI Automation framework to steal banking credentials. This marks the first known instance of malware abusing this legitimate accessibility feature designed to help people with disabilities interact with Windows systems.&lt;/p&gt;
 &lt;p&gt;Active primarily in Brazil, Coyote has targeted users of 75 banks and cryptocurrency exchanges. The malware gains initial access through malicious LNK files in &lt;a href="https://www.techtarget.com/searchsecurity/feature/How-to-avoid-phishing-hooks-A-checklist-for-your-end-users"&gt;phishing&lt;/a&gt; emails, then monitors browser activity for banking websites.&lt;/p&gt;
 &lt;p&gt;Coyote is particularly dangerous because of its ability to function offline and use UI Automation to extract sensitive information from browser tabs in a more reliable way than traditional methods. It exemplifies how attackers' techniques continue to evolve to outpace security measures.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.darkreading.com/cyber-risk/banking-trojan-coyote-windows-ui-automation"&gt;&lt;i&gt;Read the full story by Jai Vijayan on Dark Reading&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&lt;i&gt; An editor used AI tools to aid in the generation of this news brief. Our expert editors always review and edit content before publishing.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Alissa Irei is senior site editor of Informa TechTarget's SearchSecurity.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Check out the latest security news from the Informa TechTarget team.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/ransom_g846011096.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/news/366628194/News-brief-SharePoint-attacks-hammer-globe</link>
            <pubDate>Fri, 25 Jul 2025 14:29:00 GMT</pubDate>
            <title>News brief: SharePoint attacks hammer globe</title>
        </item>
        <item>
            <body>&lt;p&gt;Generic spray-and-pray phishing attacks, such as the Nigerian prince scams that were fairly easy to identify, have rapidly evolved into targeted, convincing business email compromise attacks.&lt;/p&gt; 
&lt;p&gt;Ransomware has advanced from locker strains that prevented users from accessing their systems -- something remedied by backups -- to &lt;a href="https://www.techtarget.com/searchsecurity/definition/triple-extortion-ransomware"&gt;triple extortion ransomware attacks&lt;/a&gt; that lock devices, encrypt data, extort data and even conduct DDoS attacks.&lt;/p&gt; 
&lt;p&gt;These are just two examples of how the cat-and-mouse game between malicious hackers and enterprise security defenders has changed over the years. As soon as enterprises deploy new defenses, attackers find ways to circumvent them. Then defenders figure out how to remedy those, after which attackers learn to overcome the new defenses -- and the vicious cycle repeats endlessly.&lt;/p&gt; 
&lt;p&gt;This week's featured articles explore how cyberattack trends have evolved to stay relevant.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Scattered Spider evolves attack methods against major industries"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Scattered Spider evolves attack methods against major industries&lt;/h2&gt;
 &lt;p&gt;Microsoft reported that cybercrime group Scattered Spider has implemented new attack techniques targeting the airline, insurance and retail industries since April.&lt;/p&gt;
 &lt;p&gt;While continuing its trademark &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-avoid-and-prevent-social-engineering-attacks"&gt;social engineering tactics&lt;/a&gt; of impersonating users to request password resets, Scattered Spider has expanded to abusing SMS services and employing adversary-in-the-middle approaches.&lt;/p&gt;
 &lt;p&gt;The group has also reversed its cloud-first strategy, now breaching on-premises environments before moving to cloud access.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.cybersecuritydive.com/news/scattered-spider-expands-tactics-recent-hacks/753220/"&gt;&lt;i&gt;Read the full story by David Jones on Cybersecurity Dive&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Updated malware loader enables sophisticated ransomware attacks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Updated malware loader enables sophisticated ransomware attacks&lt;/h2&gt;
 &lt;p&gt;Cybercriminals are deploying Matanbuchus 3.0, a premium malware loader priced at $10,000 to $15,000 per month, to facilitate high-value ransomware attacks.&lt;/p&gt;
 &lt;p&gt;The completely rewritten loader features advanced detection evasion, persistence mechanisms and security tool identification capabilities. In campaigns dating back to September 2024, attackers have impersonated IT help desk personnel over Microsoft Teams calls, convinced employees to grant remote access and execute malicious scripts, and deployed ransomware.&lt;/p&gt;
 &lt;p&gt;The sophisticated loader specifically performs reconnaissance to look for &lt;a href="https://www.techtarget.com/searchsecurity/definition/endpoint-detection-and-response-EDR"&gt;endpoint detection and response&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchsecurity/definition/extended-detection-and-response-XDR"&gt;extended detection and response&lt;/a&gt; products from major security vendors and employs stealthy in-memory operations.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.darkreading.com/threat-intelligence/matanbuchus-loader-ransomware-infections"&gt;&lt;i&gt;Read the full story by Nate Nelson on Dark Reading&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="AsyncRAT: Open source malware that democratizes cybercrime"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;AsyncRAT: Open source malware that democratizes cybercrime&lt;/h2&gt;
 &lt;p&gt;AsyncRAT, an open source remote access Trojan released on GitHub in 2019, has evolved into a cornerstone of modern cybercrime by spawning numerous variants.&lt;/p&gt;
 &lt;p&gt;ESET research revealed that AsyncRAT's C# codebase has created both sophisticated threats such as DCRAT and VenomRAT -- which feature advanced capabilities including ransomware modules and anti-analysis techniques -- and novelty variants such as NonEuclid RAT, which includes a plugin with five built-in jump scare images.&lt;/p&gt;
 &lt;p&gt;Primarily used by lone threat actors attracted by its low barrier to entry, AsyncRAT persists because platforms hosting its code often avoid takedowns by &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-prevent-living-off-the-land-attacks"&gt;branding as legitimate tools&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.darkreading.com/remote-workforce/async-rat-labyrinth-forks"&gt;&lt;i&gt;Read the full story by Jai Vijayan on Dark Reading&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&lt;i&gt; An editor used AI tools to aid in the generation of this news brief. Our expert editors always review and edit content before publishing.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Sharon Shea is executive editor of Informa TechTarget's SearchSecurity site.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Check out the latest security news from the Informa TechTarget team.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/ransom_g1264284948_01.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/news/366627923/News-brief-Cyberattack-trends-signal-security-arms-race</link>
            <pubDate>Fri, 18 Jul 2025 13:51:00 GMT</pubDate>
            <title>News brief: Cyberattack trends signal security arms race</title>
        </item>
        <item>
            <body>&lt;p&gt;The practice of &lt;a href="https://www.techtarget.com/searchsecurity/definition/What-is-risk-management-and-why-is-it-important"&gt;risk management&lt;/a&gt; has, until recently, assumed timelines that are based on human decision-making. But now AI-powered risk management systems can raise issues in real time and even predict them.&lt;/p&gt; 
&lt;p&gt;AI is also helping to transform enterprise risk management (&lt;a href="https://www.techtarget.com/searchcio/definition/enterprise-risk-management"&gt;ERM&lt;/a&gt;) from a reactive, compliance-driven function -- often seen as a necessary but unloved cost center -- into a proactive, strategic capability that identifies and mitigates business risks before they materialize.&lt;/p&gt; 
&lt;p&gt;The benefits are promising, but risk leaders must also understand the challenges of AI implementation. Such knowledge is essential for organizations looking to modernize their risk management practices while maintaining regulatory compliance and the trust of customers, employees and investors. Many still hesitate when confronting the looming complexity of fully integrating AI into the &lt;a href="https://www.techtarget.com/searchcio/feature/Risk-management-process-What-are-the-5-steps"&gt;risk management process&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;In particular, the technical architecture that integrates AI into existing ERM platforms must support a graduated approach that results in systems that can take immediate actions in clear and precise scenarios, escalate ambiguous situations to human oversight (so-called humans in the loop) and continuously learn from both situations. However, this requires a level of integration between risk, business and IT systems that most organizations haven't yet achieved.&lt;/p&gt; 
&lt;p&gt;To help &lt;a href="https://www.techtarget.com/searchcio/definition/risk-manager"&gt;risk managers&lt;/a&gt; map out the possibilities and what needs to be done, let's examine some of the benefits, applications and challenges that teams face on the journey to AI-powered risk management.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Benefits of using AI in risk management"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Benefits of using AI in risk management&lt;/h2&gt;
 &lt;p&gt;AI brings numerous advantages to risk management, including the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Increased ability to predict business risks. &lt;/b&gt;&lt;a href="https://www.techtarget.com/searchcio/feature/Enterprise-risk-management-team-Roles-and-responsibilities"&gt;Risk management teams&lt;/a&gt; can shift from reactive to predictive risk identification by using &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-ML"&gt;machine learning&lt;/a&gt; algorithms to analyze historical patterns and forecast potential risk events before they occur. The resulting &lt;a href="https://www.techtarget.com/searchcio/tip/Risk-prediction-models-How-they-work-and-their-benefits"&gt;risk prediction models&lt;/a&gt; help prevent equipment failures, website downtime and other business problems.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Improved decision-making speed and accuracy. &lt;/b&gt;Business executives gain access to real-time risk insights and automated risk scoring that reduce decision-making time from days to minutes. However, this improvement also demands greater accuracy and validation; speedier decisions without accuracy could be a risk in themselves. The seemingly authoritative nature of AI recommendations can sometimes mask underlying uncertainties that require careful interpretation.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Automated risk monitoring and reporting. &lt;/b&gt;With IT's help, risk management teams can implement continuous monitoring systems that automatically scan for &lt;a href="https://www.techtarget.com/searchcio/definition/key-risk-indicator-KRI"&gt;key risk indicators&lt;/a&gt;. These systems can generate real-time alerts and produce standardized reports for regulatory compliance. Automation also frees up risk professionals to focus on higher-level strategic work that only humans can do, though some might resist delegating such critical assessments to an algorithmic process.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cost reduction through process automation. &lt;/b&gt;Organizations can achieve cost savings by automating manual &lt;a href="https://www.techtarget.com/searchsecurity/definition/risk-assessment"&gt;risk assessment&lt;/a&gt; processes. Although automation can reduce the need for risk management teams to perform routine analyses, its greatest benefits will likely come from human-AI collaboration rather than human replacement. AI can handle the scanning, pattern recognition and initial analysis at machine speed, while risk managers interpret the context and assess sensitive issues such as brand reputation and human impact -- areas where judgment remains essential.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Scalable risk assessments across complex business operations. &lt;/b&gt;Risk management teams can analyze vast amounts of data across multiple business units, geographies and risk categories simultaneously, providing comprehensive risk visibility that would be impossible to achieve manually. But AI's value here goes beyond just processing more data: People can now analyze different types of data simultaneously, finding connections that span conventional categories of risk in ways that are often both potent and revelatory.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Enhanced fraud detection and prevention capabilities. &lt;/b&gt;AI systems can identify subtle patterns and anomalies in transaction data, user behavior and operational activities that human analysts might miss. The aim is to improve fraud detection rates while mitigating the corrosive effect of false positives on customer trust, which requires these systems to maintain exceptionally high standards.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Applications of AI in risk management"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Applications of AI in risk management&lt;/h2&gt;
 &lt;p&gt;AI improves the speed and accuracy of common risk management tasks, such as the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Credit risk modeling. &lt;/b&gt;Although this field of risk management is relatively mature, with AI, financial institutions can incorporate alternative data sources such as &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/CRM-customer-relationship-management"&gt;CRM&lt;/a&gt; systems alongside deep historical data analysis and real-time financial indicators. The AI enables more objective risk assessment methods that minimize human bias, thereby reducing default rates and improving portfolio performance.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Operational risk assessment. &lt;/b&gt;Internal processes, employee behavior and system performance can all create &lt;a href="https://www.techtarget.com/searchsecurity/definition/operational-risk"&gt;operational risks&lt;/a&gt;, such as compliance violations, process failures and security breaches. AI can monitor these risks, separately or in combination, before they escalate into major incidents. This is often a first AI project for risk management because it's internal facing, has lower regulatory complexity and can quickly demonstrate value.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Market risk analysis. &lt;/b&gt;Investment firms and banks have long used predictive models for short-term analyses. New AI models can analyze a wider range of correlation patterns, market volatility and economic indicators to better understand portfolio exposure and optimize risk-adjusted returns. However, instead of just protecting against volatility, investors can use the same models to identify market inefficiencies and emerging investment opportunities that competitors haven't recognized yet.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cybersecurity risk management. &lt;/b&gt;IT managers deploy &lt;a href="https://www.techtarget.com/searchenterpriseai/tip/Evaluate-the-risks-and-benefits-of-AI-in-cybersecurity"&gt;AI-powered cybersecurity tools&lt;/a&gt; to continuously monitor network traffic, user behavior and system vulnerabilities so organizations can detect and respond to anomalous behavior and possible cyberthreats in real time. Moreover, the AI systems don't just detect known threats but are starting to predict attack vectors that haven't been seen "in the wild" yet. They can do this by understanding the attacker and how individual vulnerabilities can interact or be combined in novel ways by malicious users.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Regulatory compliance monitoring. &lt;/b&gt;Risk management teams use &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/natural-language-processing-NLP"&gt;natural language processing&lt;/a&gt; to automatically review emails and other communications, along with transactions, for regulatory requirements. This ensures they are continuously compliant and audit-ready, reducing the risk of penalties. A great advantage of some AI systems, such as &lt;a href="https://www.techtarget.com/whatis/definition/large-language-model-LLM"&gt;large language models&lt;/a&gt;, is that they can execute reviews across multiple languages automatically.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Supply chain risk assessment. &lt;/b&gt;Companies can use AI to monitor supplier performance, geopolitical events, weather patterns and economic indicators -- all complex influences that can &lt;a href="https://www.techtarget.com/whatis/definition/supply-chain-risk-management-SCRM"&gt;disrupt supply chains&lt;/a&gt;. The ability of AI to integrate analyses across these domains enables more effective contingency planning and, if necessary, diversification in suppliers, shippers and route plans.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Insurance risk underwriting. &lt;/b&gt;Insurance companies are significant players in the risk management space and are turning increasingly to AI to analyze customer data, external risk factors and historical claims patterns. These capabilities enable them to more accurately price policies and identify high-risk applicants. As with other applications, there is a predictive element, too. Instead of just assessing current risk profiles, insurers can predict how the profiles will evolve over the lifetime of policies.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Monitoring environmental, social and governance risks. &lt;/b&gt;Organizations can take advantage of AI to &lt;a href="https://www.techtarget.com/sustainability/feature/ESG-metrics-Tips-and-examples-for-measuring-ESG-performance"&gt;track ESG metrics&lt;/a&gt;, analyze customer or stakeholder sentiment and monitor regulatory changes. This helps to identify reputational and operational risks related to sustainability, social responsibility and corporate governance initiatives. However, evaluating these &lt;a href="https://www.techtarget.com/sustainability/tip/ESG-risks-explained-Examples-and-tips-on-managing-them"&gt;types of ESG risks&lt;/a&gt; generally requires close human involvement, as AI models might be unaware of social trends, regulatory changes or evolving sentiment that can affect levels of risk for a company.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Challenges of using AI in risk management"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Challenges of using AI in risk management&lt;/h2&gt;
 &lt;p&gt;Organizations seeking to augment their risk management strategies with AI can expect to face some of the following hurdles:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Data quality and availability issues. &lt;/b&gt;Obtaining clean, complete and relevant data has always been an issue for risk managers. The problem takes on a new significance with algorithmic AI processes because legacy systems often contain inconsistent data formats, missing information and historical biases that can compromise risk model effectiveness. As a result, organizations often run technical projects to address data quality specifically for AI-enabled risk management.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Model interpretability and explainability. &lt;/b&gt;New AI regulations in many jurisdictions require explanations for AI-driven decisions. But even for experts, it can be difficult to understand how specific risk assessments are generated. Some newer AI systems can show their reasoning and identify which data inputs most influenced specific decisions, but this requires deliberate design of the system and the prompts fed into it to generate results.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Integration with legacy systems and processes. &lt;/b&gt;IT managers must handle the complexities of integrating modern AI tools with existing risk management systems, databases and workflows that weren't designed for AI integration. As with data quality, fixing this often calls for a focused technical project.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Regulatory compliance and governance concerns. &lt;/b&gt;The regulatory compliance dimension is particularly challenging because the rules are still evolving. Teams are trying to build compliant systems for regulations that don't fully exist yet. Some regulators want full explainability, others accept statistical validation, and requirements vary by jurisdiction.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Skills gap and change management challenges. &lt;/b&gt;Organizations struggle to find and retain people who have both &lt;a href="https://www.techtarget.com/searchcio/feature/Top-12-risk-management-skills-and-why-you-need-them"&gt;risk management expertise&lt;/a&gt; and AI technical skills. Furthermore, risk professionals require significant training to use AI-powered tools effectively and interpret their output. One potential solution is to build AI risk management expertise through structured collaboration between domain experts and AI specialists working in cross-functional teams, where knowledge transfer happens organically rather than through formal training.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Risk model validation. &lt;/b&gt;Traditional approaches for validating risk models might not be robust for AI models that continuously learn and adapt. Validating adaptive risk models is still an emerging practice.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Bias and fairness considerations. &lt;/b&gt;&lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-bias-algorithm-bias-or-AI-bias"&gt;Algorithmic bias&lt;/a&gt; can emerge if certain customer segments or stakeholder groups are over- or underrepresented in historical data. This is notably problematic in credit decisions and insurance underwriting. Preserving historical biases to maintain model accuracy perpetuates unfair outcomes. However, removing them to ensure fairness could compromise the AI's predictive performance. The dilemma can only be resolved by a careful assessment of the historical data and diligent training of the AI involved.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Future of AI in risk management"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Future of AI in risk management&lt;/h2&gt;
 &lt;p&gt;The evolution toward real-time, integrated &lt;a href="https://www.techtarget.com/searchcio/feature/Top-ERM-software-vendors-to-consider"&gt;risk management platforms&lt;/a&gt; will enable organizations to monitor and respond to risks as they emerge, rather than discovering them through periodic assessments or after-the-fact analysis. Organizations that master this real-time risk management will be able to pursue opportunities that others miss.&lt;/p&gt;
 &lt;p&gt;Over time, explainable AI technologies will mature to provide risk managers with clear, auditable explanations for AI-driven decisions. With these techniques, managers can address regulatory requirements while maintaining the performance advantages of sophisticated machine learning models.&lt;/p&gt;
 &lt;p&gt;Technical explainability will likely be supplemented by language models that can interact like chatbots, engaging in dialogs with human risk experts while the AI spots emerging patterns, explains their significance and helps decision-makers explore the implications in real time.&lt;/p&gt;
 &lt;p&gt;Importantly, in this case, the human role evolves rather than disappears. Risk management becomes more about wisdom than analysis. Understanding stakeholder impacts, ethical implications and strategic context will remain a creative dimension of the human contribution. The future risk professional will be someone who can work with AI to explore possibilities rather than just analyze probabilities.&lt;/p&gt;
 &lt;p&gt;Intriguingly, emerging privacy-protecting technologies that mask sensitive data could allow organizations to collaborate on developing risk models while maintaining data security. This could enable industry-wide improvements in risk detection without compromising privacy. For example, imagine industry-wide AI models that can detect systemic risks without any single organization having to share proprietary data. Similarly, banks could collaborate on fraud detection while maintaining competitive confidentiality.&lt;/p&gt;
 &lt;p&gt;This commoditization of &lt;a href="https://www.techtarget.com/searchsecurity/definition/risk-analysis"&gt;risk analysis&lt;/a&gt; might bring about the biggest change in risk management. If everyone can identify and quantify risks equally well, competitive advantage comes from being willing and able to take the right risks at the right time.&lt;/p&gt;
 &lt;p&gt;AI-enabled risk management should help organizations not only avoid bad business outcomes but also pursue good ones more confidently. Instead of risk management being a cost center that simply prevents financial losses, it could become a critical capability that enables new strategies for business growth.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Donald Farmer is a data strategist with 30-plus years of experience, including as a product team leader at Microsoft and Qlik. He advises global clients on data, analytics, AI and innovation strategy, with expertise spanning from tech giants to startups. He lives in an experimental woodland home near Seattle.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>AI can improve the speed and effectiveness of risk management efforts. Here are the potential benefits, use cases and challenges your organization needs to know about.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/ai_a352095729.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/tip/The-benefits-of-using-AI-in-risk-management</link>
            <pubDate>Tue, 15 Jul 2025 17:23:00 GMT</pubDate>
            <title>AI in risk management: Top benefits and challenges explained</title>
        </item>
        <item>
            <body>&lt;p&gt;CISO as a service, or CISOaaS, is the outsourcing of &lt;a href="https://www.techtarget.com/searchsecurity/definition/CISO-chief-information-security-officer"&gt;CISO&lt;/a&gt; (chief information security officer) and information security leadership responsibilities to a third-party provider. By hiring a third-party provider to manage its security program remotely, an organization gains access to staff and resources that it does not have in-house, enabling it to better keep up with information security and compliance demands.&lt;/p&gt; 
&lt;p&gt;CISOaaS is often paid for on a subscription or per-use basis, like many anything as a service (&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/XaaS-anything-as-a-service"&gt;XaaS&lt;/a&gt;) models. Also like many XaaS models, CISOaaS offerings can be entirely remote or a hybrid model in which the provider's experts work with an organization's existing security team both remotely and on-site.&lt;/p&gt; 
&lt;p&gt;Strong security leadership is important in the modern organization, as digital transformation increases an organization's overall breadth of vulnerabilities. An industrywide cybersecurity skills shortage means that affordable, &lt;a href="https://www.techtarget.com/searchsecurity/tip/10-must-have-cybersecurity-skills-for-career-success"&gt;skilled security leaders&lt;/a&gt; are hard to find and easy to lose. High stress levels also fuel CISO turnover, leading many to bounce from organization to organization. CISOaaS can help alleviate potential staffing problems by providing organizations with access to cost-efficient security leadership on an as-needed basis.&lt;/p&gt; 
&lt;p&gt;CISOaaS is also referred to as a &lt;i&gt;virtual CISO&lt;/i&gt; (&lt;a href="https://www.techtarget.com/searchsecurity/definition/virtual-CISO-vCISO"&gt;vCISO&lt;/a&gt;).&lt;/p&gt; 
&lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/security_ciso.jpg"&gt;
 &lt;img data-src="https://www.techtarget.com/rms/onlineImages/security_ciso_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/security_ciso_mobile.jpg 960w,https://www.techtarget.com/rms/onlineImages/security_ciso.jpg 1280w" alt="An image listing eight different CISO responsibilities." height="249" width="560"&gt;
 &lt;figcaption&gt;
  &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;A CISO is a senior-level executive who is responsible for developing and implementing an information security program.
 &lt;/figcaption&gt;
 &lt;div class="main-article-image-enlarge"&gt;
  &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/figure&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What are the benefits of employing CISO as a service?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the benefits of employing CISO as a service?&lt;/h2&gt;
 &lt;p&gt;Using a virtual CISO comes with both pros and cons. The potential benefits of using CISOaaS include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Flexibility.&lt;/b&gt; CISOaaS platforms are typically flexible, enabling organizations to customize and scale the service to their specific needs.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Unbiased analysis.&lt;/b&gt; As an external third party, CISOaaS platforms can enable the vCISO to evaluate an organization's existing security program more objectively than internal employees might.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cost-effectiveness.&lt;/b&gt; Pay-as-you-go pricing lets organizations pay for only the time and services they use. A CISOaaS platform is usually less expensive than having a salaried CISO in-house and saves on capital expenditures.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;On-demand service.&lt;/b&gt; Using a service provider ensures constant availability of security resources. As demands change, organizations can alter their services accordingly.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Long- and short-term benefits.&lt;/b&gt; In the short term, CISOaaS can make organizations more secure by identifying immediate risks and introducing or tightening controls. In the long term, it can help lay the groundwork for a future in-house security program through training and improvement of core processes and infrastructure.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/the_benefits_of_cisoaas-h.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/the_benefits_of_cisoaas-h_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/the_benefits_of_cisoaas-h_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/the_benefits_of_cisoaas-h.png 1280w" alt="A bullet list image showing six benefits of a CISOaaS model. " height="209" width="279"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The CISOaaS model offers flexibility and expertise to organizations that cannot afford the traditional in-house role or have staffing issues.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Experience.&lt;/b&gt; CISOaaS provides organizations with access to a team of experienced cybersecurity professionals who have extensive experience working with a wide array of diverse organizations.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;One disadvantage of hiring a vCISO is that they likely will be serving other organizations as well. This could potentially lead to problems with loyalty, timely responses and risk ownership if a breach occurs. An in-house CISO is a better option for organizations that need an employee with no other external commitments.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Do you need CISO as a service?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Do you need CISO as a service?&lt;/h2&gt;
 &lt;p&gt;Any organization without an in-house CISO could consider CISOaaS a viable option. The following are several scenarios in which CISOaaS can be used:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Limited budgets.&lt;/b&gt; Startups without the resources to hire full-time CISOs can use CISOaaS for its expertise and cost-effectiveness.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Temporary role gaps.&lt;/b&gt; Organizations looking for new permanent CISOs can temporarily hire a CISOaaS provider to fill the gap.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Compliance deadlines.&lt;/b&gt; Companies under pressure to meet security or compliance goals can benefit from the on-demand nature of CISOaaS.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security programs.&lt;/b&gt; Those looking to upgrade their cybersecurity programs can seek the third-party expertise of CISOaaS.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Lean IT environments.&lt;/b&gt; Businesses that use &lt;a href="https://www.techtarget.com/searchcio/definition/lean-management"&gt;lean IT&lt;/a&gt; principles can temporarily employ CISOaaS rather than investing in a full-time position.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Long-term security practices.&lt;/b&gt; An organization that wants to lay the foundation for a new, long-term program but lacks a permanent security team can get started with CISOaaS.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="What to expect from CISO as a service"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What to expect from CISO as a service&lt;/h2&gt;
 &lt;p&gt;The CISOaaS provider has most of the same responsibilities as an in-house CISO. These include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Data protection.&lt;/b&gt; A CISOaaS protects the confidentiality, integration and availability of data.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cybersecurity.&lt;/b&gt; A CISOaaS provider develops a long-term cybersecurity strategy that aligns with the organization's objectives.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Governance, risk and compliance.&lt;/b&gt; A CISOaaS provider develops a &lt;a href="https://www.techtarget.com/searchsecurity/definition/governance-risk-management-and-compliance-GRC"&gt;governance, risk and compliance&lt;/a&gt; program and ensures continued compliance with relevant laws or industry regulations.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Risk assessments and risk management.&lt;/b&gt; A CISOaaS provider conducts continual risk assessments to find potential threats and vulnerabilities and implements ways to manage them.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security oversight.&lt;/b&gt; A CISOaaS provider develops, monitors and reports on security, business and communication operations and practices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Management of personnel and vendor relationships.&lt;/b&gt; A CISOaaS provider tracks vendor integrations and &lt;a href="https://www.techtarget.com/searchsecurity/tip/15-benefits-of-outsourcing-your-cybersecurity-operations"&gt;manages other third-party security services&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Metrics and reporting.&lt;/b&gt; A CISOaaS provider &lt;a href="https://www.techtarget.com/searchsecurity/tip/7-key-cybersecurity-metrics-for-the-board-and-how-to-present-them"&gt;defines key performance indicators&lt;/a&gt; to measure security program effectiveness.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;CISOaaS providers serve multiple businesses simultaneously. A vCISO must therefore have good people skills and be able to adapt to, understand and meet each customer's unique needs.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="CISO as a service vs. full-time CISO"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;CISO as a service vs. full-time CISO&lt;/h2&gt;
 &lt;p&gt;A traditional CISO is a senior-level executive responsible for developing and implementing an information security program. They work full-time within a company, helping to steer their organization's security efforts. This role is intended to fulfill continuous leadership for in-house cybersecurity.&lt;/p&gt;
 &lt;p&gt;A vCISO, offered through a CISOaaS offering, however, is an external entity. The idea of CISO as a service is to outsource the role to a qualified third party. Instead of hiring a full-time employee to fill the role in a traditional manner, a CISOaaS provider often works in a more flexible manner. They might work part-time, act as a consultant or work in a hybrid online or in-person manner. They provide the same level of expertise as a traditional full-time CISO but with more flexibility. This is ideal for organizations that do not require or cannot afford a full-time traditional employee to fill the role.&lt;/p&gt;
 &lt;p&gt;Sometimes vCISOs are hired to implement short-term fixes to security issues; other times, they are hired for longer-term projects, such as developing a company's entire security program.&lt;/p&gt;
 &lt;p&gt;CISOs are some of the highest-paid professionals in IT security, &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-become-a-CISO"&gt;making it an attractive role&lt;/a&gt;. Hiring a vCISO is often drastically less expensive because of its payment model. Because of this, vCISOs are increasingly being used by managed service providers and managed security service providers to &lt;a href="https://www.channelfutures.com/security/much-pain-lots-of-gain-for-virtual-cisos"&gt;deliver services&lt;/a&gt;.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/vuzbQLxF-Ks?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="5 CISOaaS providers"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5 CISOaaS providers&lt;/h2&gt;
 &lt;p&gt;Although there are numerous CISOaaS offerings, the following is just a sampling:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Bulletproof.&lt;/b&gt; This U.K.-based vCISO service offers modular subscription package options and strongly focuses on Cyber Security Services, Accreditations &amp;amp; Training (CREST) best practices and implementations. CREST is an international not-for-profit cybersecurity industry organization.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;FRSecure.&lt;/b&gt; FRSecure is a cybersecurity consulting firm that offers vCISO services that focus on vulnerability management for well-regulated industries.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Kroll.&lt;/b&gt; This cybersecurity and risk management firm is known for its incident response and digital forensics capabilities. The company also offers vCISO services that boast of its skilled experts.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Integris.&lt;/b&gt; Integris is an IT firm that also offers vCISO services. These vCISOs have Certified Information Systems Security Professional -- commonly known as &lt;a href="https://www.techtarget.com/searchsecurity/definition/Certified-Information-Systems-Security-Professional"&gt;CISSP&lt;/a&gt; -- accreditation and are focused on compliance and governance support.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;TechMagic.&lt;/b&gt; This CISOaaS provider offers ISO 27001‑certified consultants. It also provides other cybersecurity services, such as threat intelligence and application security as a service.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;CISOaaS offerings are usually pay-as-you-go and on-demand models. They are often paid for as a yearly subscription using a retainer. The amount of time the vCISO spends on-site is negotiated, and the retainer is based on a set number of days or hours per year. This varies based on the vendor's offerings and the customer organization's needs.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;The CISO role has evolved over time and is offered either in-house or outsourced in an as-a-service model. Learn more about &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/The-CISO-evolution-From-security-gatekeeper-to-strategic-leader"&gt;&lt;i&gt;how the chief information security officer role evolved&lt;/i&gt;&lt;/a&gt;&lt;i&gt;. &lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>CISO as a service, or CISOaaS, is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/3.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/definition/CISO-as-a-service-vCISO-virtual-CISO-fractional-CISO</link>
            <pubDate>Wed, 09 Jul 2025 00:00:00 GMT</pubDate>
            <title>What is a CISO as a service (CISOaaS)?</title>
        </item>
        <item>
            <body>&lt;p&gt;Because security decisions are made based on risk analysis, risk assessment remains an essential element of a cybersecurity professional's toolbox.&lt;/p&gt; 
&lt;p&gt;The goal is to provide a realistic, comprehensive picture of an organization's presence that extends beyond the IP addresses to all the factors around that, including processes and personnel. The result should be a plan that guides the organization into a thoroughly understood view of their risks and priorities.&lt;/p&gt; 
&lt;p&gt;Risk is a function of threat and vulnerability. For risk to exist, both threat and vulnerability must concurrently exist. Risk assessment implicitly implies this existence and assumes that something of value must be protected.&lt;/p&gt; 
&lt;p&gt;The protection of assets -- both tangible and not -- is key in driving the risk assessment process. Thus, an asset inventory analysis should precede a risk assessment.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Scope of risk assessment"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Scope of risk assessment&lt;/h2&gt;
 &lt;p&gt;Scoping the cybersecurity risk assessment is key to having a meaningful outcome. Where to draw the boundaries varies depending on the nature of the environment. Some key items to consider when scoping the work include the organization's public face and how far it reaches, thinking of connections that extend outside the organization. Depending on the company's attractiveness to adversaries, the scope of the assessment can grow to include infrastructure and supply chains.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchdatacenter/tip/Figure-out-the-differences-of-asset-management-vs-CMDB"&gt;Asset values and locations&lt;/a&gt; will drive much of the scoping and assumptions. For example, financial assets stored in an insured financial institution can be placed out of scope, since that institution manages the risk and liability. The path into the account for deposits and withdrawals, however, is clearly in scope. When setting the project scope, the boundaries and assumptions must both be clearly set and annotated.&lt;/p&gt;
 &lt;p&gt;And don't overlook the importance of time. Risk assessments are snapshots of a specific moment. While the validity time window for risk assessments is longer than the window for vulnerability assessments, the risk assessment also requires periodic refreshes. Procedures and personnel will change, as will technologies. All can change the risk profile.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="How to identify cybersecurity risks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to identify cybersecurity risks&lt;/h2&gt;
 &lt;p&gt;Once the assets have been identified and the scope has been set, the stage is set to start examining risks. Here is where a good security architect or the architectural report can come in handy. A top-level architecture view can provide the vision of how an organization ties assets and procedures into the mission. Understanding the organization's mission early in the process pays off in the ranking of findings.&lt;/p&gt;
 &lt;p&gt;A focus on the risks requires a full-scope examination, from the physical to the personnel and everything in between. When identifying risks, be as thorough with the physical and procedural risk factors as with the procedural and technologic risk factors. When determining physical risks, for example, consider the role of natural disasters as well as the human-made disasters sometimes associated with construction. Remember to consider access to the site and assets.&lt;/p&gt;
 &lt;p&gt;Technology might be the easiest part of the assessment. Security auditing products, such as the open source network-mapping &lt;a href="https://nmap.org/docs.html" target="_blank" rel="noopener"&gt;tool&lt;/a&gt; Nmap, can quickly return results.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/Beyond-awareness-Human-risk-management-metrics-for-CISOs%20"&gt;As for humans&lt;/a&gt;, it's fair to acknowledge that they make costly mistakes, but it is wrong to label them &lt;i&gt;the weakest link&lt;/i&gt;, as is common in IT conversations. It would be more accurate to describe humans as &lt;i&gt;the least-understood link&lt;/i&gt;.&lt;/p&gt;
 &lt;p&gt;People range from bold defender to willing saboteur to inadvertent helper. We all know that person who clicks the link, but we also need to consider the individual whose seemingly harmless social media post makes them an inviting target for an attacker. That person can be blamed, but, if no procedures are in place advising on social media behavior, the problem is also procedural. Thus, the risk assessment, much like the architectural planning, requires a much more holistic view of the organization.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/security-5_cybersecurity_risk_assessment_steps-h.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/security-5_cybersecurity_risk_assessment_steps-h_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/security-5_cybersecurity_risk_assessment_steps-h_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/security-5_cybersecurity_risk_assessment_steps-h.png 1280w" alt="List of cybersecurity risk assessment steps" height="240" width="279"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Beginning with the mission statement, a risk analysis should consider which risks -- physical and virtual -- exist. Consider the functions, procedures, data and personnel that contribute to the mission and how each of these offers support. What risks exist at this level?&lt;/p&gt;
 &lt;p&gt;At this point, assets are being mapped to functions. This is also an opportunity to identify assets that might have been previously overlooked. Going deeper, which technologies provide support, and how is that support provided? How are they connected into the overall system? Which risks exist in the object, functions and interconnections? This scrutiny results in the application of a systems approach to risk analysis.&lt;/p&gt;
 &lt;p&gt;As the process of understanding the network continues, the risk assessor should also consider the overall footprint. Identify partner access, remote access and, when necessary, cloud connection points or endpoints. Know which tenants share the physical space and which cloud services are being used. IaaS should be of most significant concern, followed by PaaS and then SaaS.&lt;/p&gt;
 &lt;p&gt;If the service is managed by the cloud service provider (CSP), the service is out of scope. Even so, the &lt;a href="https://www.techtarget.com/searchstorage/definition/cloud-storage-SLA"&gt;cloud service-level agreement&lt;/a&gt; should be reviewed, and risks in the agreement should be addressed. An example of this is when a CSP has many self-managed tenants, in which case the client organization will want assurances based on fellow tenant vulnerabilities. A vulnerability in one tenant space that goes unaddressed can result in a compromise, in certain cases, of the hypervisor. Most CSPs run a tight ship. Still, in a what-if risk assessment, all situations involving &lt;a href="https://www.techtarget.com/searchsecurity/tip/Key-factors-to-achieve-data-security-in-cloud-computing"&gt;data protection in the cloud&lt;/a&gt; should be considered.&lt;/p&gt;
 &lt;p&gt;In addition to the cloud, what other resources are shared? How are those resources attained? What about the supply chains to those resources? Which resources are unique or irreplaceable? How are they separated and backed up? NIST has compiled a comprehensive list of &lt;a href="https://csrc.nist.gov/pubs/sp/800/37/r2/final"&gt;similar questions to ask&lt;/a&gt; about risk management.&lt;/p&gt;
&lt;/section&gt;            
&lt;section class="section main-article-chapter" data-menu-title="Analyze risks and their potential danger"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Analyze risks and their potential danger&lt;/h2&gt;
 &lt;p&gt;The process of tying risk to potential danger involves both technical and organizational knowledge. Each discovered vulnerability must be traced to every corporate function that it touches. In effect, the risk assessor creates a dependency model, typically depicted as a diagram, showing the path taken and where the vulnerability is invoked.&lt;/p&gt;
 &lt;p&gt;This risk analysis phase is another departure point of discussion. Determining the impact value can be subjective, objective or a hybrid of both. Objective impacts are typically mapped to dollar amounts, so risks to inventory can easily fit into this group. Subjective values, however, typically cover the intangibles, such as loss of trust, loss of personnel and even loss of intellectual property. These assets are typically more difficult to measure objectively.&lt;/p&gt;
 &lt;p&gt;In addition to asset value, workflow value should also be considered. An example of workflow valuation occurs when a vulnerability might not be associated with a high-cost event but is so frequent that numerous events are associated with the vulnerability. As a result, the remediation of that problem might result in extensive downtime or other lost availability.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Prioritize risks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Prioritize risks&lt;/h2&gt;
 &lt;p&gt;Risk prioritization is an area of discussion in many cybersecurity circles. Some risk analysis, especially when a vulnerability scan reveals a problem, relies on predefined values provided by the software. This is a mistake. Risk analyses are unique to each organization, as is leadership's risk tolerance.&lt;/p&gt;
 &lt;p&gt;There's also the overselling of fear, uncertainty and doubt (FUD) in cybersecurity. Scare tactics can result in a quick buying decision, with the buyer needing constant reassurance. On the other end of this spectrum is the customer who might acknowledge problems and then ask, "But what's the chance it will happen to me?" This results in a discussion of &lt;a href="https://www.techtarget.com/whatis/definition/threat-actor"&gt;threat actors&lt;/a&gt;, their methods and how they operate in specific industries. Even though this information is a part of the assessment, it does little to answer the question about the odds of the event occurring.&lt;/p&gt;
 &lt;p&gt;Don't put too much credence in the risk values that vulnerability software assigns based on usage. For example, a bug in a frequently used library might be assigned a high-risk score due to the library's frequent use by many software modules. This is problematic. Even a frequently used, error-prone library might never reach a critical asset. So, is the risk from that vulnerability a priority, or should the risk be downgraded?&lt;/p&gt;
 &lt;p&gt;It can be tricky to prioritize risk. The task will be based on the customer's and assessor's understanding of risk. The assessor can serve the customer well by offering a cost-benefit analysis where appropriate. When assets are more subjective, consider mapping those assets to revenue and determine the portion of revenue that the asset contributes. In short, find meaningful metrics and apply them appropriately.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Document risks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Document risks&lt;/h2&gt;
 &lt;p&gt;Creating a final report is an important but time-consuming step. Do not use an AI tool to assist with the writing of the report. Much of the data collected in a risk assessment is proprietary. AI not only generates results based on the proprietary data but also adds that information to its training data set, essentially scooping up and claiming the proprietary data. Proceed without AI.&lt;/p&gt;
 &lt;p&gt;When it is complete, the cybersecurity risk assessment should identify the vulnerabilities and threat actors. Perhaps you'll have those vulnerabilities and threats sorted into a matrix and quantitatively prioritized.&lt;/p&gt;
 &lt;p&gt;Remember to document both risks and relationships. Relationships were likely attained from your dependency model. A good report will also contain the mitigation plan and path, discussing both near-term tactical actions and long-term strategic goals.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Char Sample is a cybersecurity research fellow at ICF International.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>When assessing cybersecurity risk, be sure to consider the scope of the project, your organization's specific assets and leadership's tolerance for risk.</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/cyber-security-computer-training-fotolia.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/tip/How-to-perform-a-cybersecurity-risk-assessment-step-by-step</link>
            <pubDate>Wed, 09 Jul 2025 00:00:00 GMT</pubDate>
            <title>How to perform a cybersecurity risk assessment in 5 steps</title>
        </item>
        <item>
            <body>&lt;p&gt;Microsoft addressed 130 unique new CVEs this month -- one of the larger Patch Tuesday releases of late -- but admins have no pressing zero-day vulnerabilities to tackle.&lt;/p&gt; 
&lt;p&gt;Of the new vulnerabilities, there were 14 CVEs rated critical, 115 rated important and one labeled moderate. As usual, most vulnerabilities are in the Windows OS, with a mix of flaws affecting Azure, Microsoft Office and Hyper-V. Microsoft also republished seven CVEs and included fixes for 10 non-Microsoft products, including ones that affect libraries in Visual Studio. There is one public disclosure in SQL Server (CVE-2025-49719).&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Microsoft Office and RRAS vulnerabilities take precedence"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Microsoft Office and RRAS vulnerabilities take precedence&lt;/h2&gt;
 &lt;p&gt;This month, admins will have to focus on releasing Windows cumulative updates quickly, particularly since a high concentration of vulnerabilities affect Windows Routing and Remote Access Service, with 16 total. All the RRAS CVEs have a maximum severity of important and an exploitability assessment of exploitation unlikely.&lt;/p&gt;
 &lt;p&gt;RRAS in Windows Server handles network traffic control and remote connectivity on public and private networks, providing &lt;a href="https://www.techtarget.com/searchwindowsserver/tutorial/Why-you-can-benefit-from-using-Always-On-VPN"&gt;compatibility with several VPN protocols&lt;/a&gt; and ensuring secure remote access.&lt;/p&gt;
 &lt;p&gt;Most of the risk types are remote code execution, with two in the information disclosure threat category.&lt;/p&gt;
 &lt;p&gt;"The vulnerabilities are all remotely exploitable without the need for authentication over the network," said Chris Goettl, vice president of product management for security products at Ivanti.&lt;/p&gt;
 &lt;p&gt;He said the following mitigations could curb attacks on RRAS:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Limit RRAS ports to trusted networks or &lt;a href="https://www.techtarget.com/searchnetworking/answer/How-does-the-VPN-concentrator-work"&gt;VPN concentrators&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Apply strict firewall rules to RRAS ports.&lt;/li&gt; 
  &lt;li&gt;Disable unused features in RRAS or determine whether the service can be removed entirely.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Microsoft Office also had 16 total CVEs, with six rated critical and the rest important. Six vulnerabilities affect the core Microsoft Office platform, plus two in Excel, one in PowerPoint, three in SharePoint, three in Microsoft Word and one in the Microsoft Office Developer Platform.&lt;/p&gt;
 &lt;p&gt;Admins will want to focus on the CVEs rated more likely to be exploited:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;CVE-2025-49695: Microsoft Office remote code execution vulnerability, 8.4 CVSS, critical rating.&lt;/li&gt; 
  &lt;li&gt;CVE-2025-49696: Microsoft Office remote code execution vulnerability, 8.4 CVSS, critical rating.&lt;/li&gt; 
  &lt;li&gt;CVE-2025-49701: Microsoft Office SharePoint remote code execution vulnerability, 8.8 CVSS, important rating.&lt;/li&gt; 
  &lt;li&gt;CVE-2025-49704: Microsoft Office SharePoint remote code execution vulnerability, 8.8 CVSS, critical rating.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;The preview pane is a potential attack vector for CVE-2025-49695 and CVE-2025-49696, meaning that users only need to preview a malicious file to trigger the exploit.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="Patches for 7 CVEs related to Visual Studio released"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Patches for 7 CVEs related to Visual Studio released&lt;/h2&gt;
 &lt;p&gt;Admins who work with development teams will need to ensure that seven vulnerabilities -- CVE-2025-27613, CVE-2025-27614, CVE-2025-46334, CVE-2025-46835, CVE-2025-48384, CVE-2025-48385 and CVE-2025-48386 -- related to Git are addressed by updating to the latest version of Visual Studio.&lt;/p&gt;
 &lt;p&gt;Regular updates to these third-party libraries are crucial to &lt;a href="https://www.techtarget.com/searchsecurity/tip/Leading-open-source-application-security-testing-tools"&gt;prevent the slow accumulation of security debt&lt;/a&gt; and maintain compliance with service-level agreements, according to Goettl.&lt;/p&gt;
 &lt;p&gt;"Most development organizations, if they're doing a good CI/CD pipeline assessment, are going to see vulnerabilities in the third-party libraries and development tools they're using," he said.&lt;/p&gt;
 &lt;p&gt;Goettl said the method to test fixes for developer tools depends on the size of the organization. Smaller ones rely on regression testing with the new libraries installed to run validation checks. Larger organizations typically use a staged rollout, starting with the lower-risk environments before updating the more critical systems.&lt;/p&gt;
 &lt;p&gt;"It's quite a bit different than just an automated patch management process of OS updates and third-party updates when you're dealing with the development side. There's a bit more of a heavy lift to validate that everything is good," Goettl said.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Other security updates of note for July Patch Tuesday"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Other security updates of note for July Patch Tuesday&lt;/h2&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Two Azure-related CVEs will only require admin intervention if auto-update functionality is not enabled. An Azure Service Fabric runtime elevation-of-privilege vulnerability (CVE-2025-21195) has a CVSS rating of 6.0. An Azure Monitor Agent remote code execution vulnerability (CVE-2025-47988) has a 7.5 CVSS rating.&lt;/li&gt; 
  &lt;li&gt;Microsoft corrected an issue stemming from its June Patch Tuesday security updates that caused Dynamic Host Configuration Protocol (DHCP) problems with Windows Server. The affected Windows Server systems and their Knowledge Base articles are Windows Server 2025 (KB5060842), Windows Server 2022 (KB5060526), Windows Server 2019 (KB5060531) and Windows Server 2016 (KB5061010). DHCP automatically assigns IP addresses to devices on a network and manages IP address leases.&lt;/li&gt; 
  &lt;li&gt;Microsoft republished a June Patch Tuesday fix for a .NET and Visual Studio remote code execution vulnerability (CVE-2025-30399) that was expanded to include PowerShell 7.4 and 7.5. "An attacker could exploit this vulnerability by placing files in particular locations, leading to unintended code execution," according to Microsoft's security &lt;a target="_blank" href="https://github.com/PowerShell/Announcements/issues/77" rel="noopener"&gt;advisory&lt;/a&gt;. The vulnerability is particularly significant because it affects Windows, macOS and Linux systems that run those exploitable PowerShell versions.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="Next phase of Kerberos hardening process takes effect"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Next phase of Kerberos hardening process takes effect&lt;/h2&gt;
 &lt;p&gt;July Patch Tuesday also implemented the next stage in the three-phase process to improve security for Kerberos authentication to prevent machine-in-the-middle attacks and &lt;a href="https://www.techtarget.com/searchsecurity/feature/A-list-of-wireless-network-attacks"&gt;local network spoofing&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;On April Patch Tuesday, Microsoft first addressed a Windows Kerberos elevation-of-privilege vulnerability (CVE-2025-26647) in Windows Server systems and introduced Audit mode to uncover noncompliant certificates. Admins were expected to use Audit logs to find these certificates, make corrections and check for issues.&lt;/p&gt;
 &lt;p&gt;July Patch Tuesday's release introduced the second phase, Enforced by Default, to domain controllers. This update makes checks to the NTAuth store -- the &lt;a target="_blank" href="https://learn.microsoft.com/en-us/troubleshoot/windows-server/certificates-and-public-key-infrastructure-pki/import-third-party-ca-to-enterprise-ntauth-store" rel="noopener"&gt;repository&lt;/a&gt; on Windows domain controllers that contains a list of trusted certificate authorities -- mandatory, but admins can temporarily revert to Audit mode for adjustments.&lt;/p&gt;
 &lt;p&gt;After the October Patch Tuesday updates, Microsoft will put domain controllers in Enforcement mode and remove the ability to enable these registry bypasses.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Tom Walat is the site editor for Informa TechTarget's SearchWindowsServer site.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Admins will want to focus on issuing corrections for the large number of flaws, some of which require no user interaction, in Windows RRAS and Microsoft Office.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/ransom_g1264284948_01.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/news/366627292/Microsoft-targets-130-vulnerabilities-on-July-Patch-Tuesday</link>
            <pubDate>Tue, 08 Jul 2025 20:43:00 GMT</pubDate>
            <title>Microsoft targets 130 vulnerabilities on July Patch Tuesday</title>
        </item>
        <item>
            <body>&lt;p&gt;Bitdefender researchers discovered that an overwhelming 84% of major attacks -- rated as those incidents with high severity by the vendor's cybersecurity platform -- use living-off-the-land techniques.&lt;/p&gt; 
&lt;p&gt;After analysis of more than 700,000 security events logged by the Bitdefender GravityZone platform across 90 days, researchers concluded that adversaries are "demonstrably successful in evading traditional defenses by expertly manipulating the very system utilities we trust and rely on daily -- and threat actors operate with a confident assertion of undetectability."&lt;/p&gt; 
&lt;p&gt;LOTL attacks aren't new. While the term was coined in 2013, the approach dates back to 2001's Code Red, a &lt;a href="https://www.techtarget.com/searchsecurity/definition/worm"&gt;worm&lt;/a&gt; that ran entirely in memory, didn't download or install any files, and reportedly cost billions in damages.&lt;/p&gt; 
&lt;p&gt;In a nutshell, LOTL attacks use legitimate software and functions that &lt;a target="_blank" href="https://www.bitdefender.com/en-us/blog/businessinsights/700000-security-incidents-analyzed-living-off-land-tactics" rel="noopener"&gt;already exist&lt;/a&gt; in victim systems to perform attacks. In the case of Code Red, the worm exploited Microsoft's IIS web server software to conduct DoS attacks. Because they use known and trusted systems, these attacks are often able to hide in the background and evade users, making them difficult to &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-prevent-living-off-the-land-attacks"&gt;prevent, detect and mitigate&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;Once inside a victim's systems, attackers can perform reconnaissance, deploy fileless or memory-only malware, and steal credentials, among other LOTL techniques -- completely unbeknownst to the victim.&lt;/p&gt; 
&lt;p&gt;This week's roundup highlights a malware campaign that conducts LOTL attacks against Cloudflare Tunnel infrastructure and Python-based loaders. Plus, scammers use legitimate websites to trick victims seeking tech support, and malicious GitHub repositories masquerade as legitimate penetration testing suites.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Serpentine#Cloud uses shortcut files and Cloudflare infrastructure"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Serpentine#Cloud uses shortcut files and Cloudflare infrastructure&lt;/h2&gt;
 &lt;p&gt;Researchers at Securonix have identified a sophisticated malware campaign called Serpentine#Cloud that uses LNK shortcut files to deliver remote payloads. Attacks begin with phishing emails containing links to zipped attachments that execute remote code when opened, ultimately deploying a Python-based, in-memory shellcode loader that backdoors systems.&lt;/p&gt;
 &lt;p&gt;Threat actors use Cloudflare's tunneling service to host the malicious payloads, benefiting from its trusted certificates and use of HTTPS. While showing some sophistication reminiscent of nation-state actors, certain coding choices of these LOTL attacks have suggested that Serpentine#Cloud is likely not from any major nation-state groups.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.darkreading.com/cloud-security/serpentinecloud-cloudflare-tunnels-sneak-attacks"&gt;&lt;i&gt;Read the full story by Alexander Culafi on Dark Reading&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Scammers hijack search results with fake tech support numbers"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Scammers hijack search results with fake tech support numbers&lt;/h2&gt;
 &lt;p&gt;Cybercriminals are creating deceptive tech support scams by purchasing sponsored Google ads that appear to represent major brands, including Apple, Microsoft and PayPal. Unlike traditional scams, these attacks direct users to legitimate company websites, but overlay fraudulent support phone numbers. When users call these numbers, scammers pose as official tech support to steal data and financial information or gain remote access to devices.&lt;/p&gt;
 &lt;p&gt;Malwarebytes researchers called this a "search parameter injection attack," where malicious URLs embed fake phone numbers into genuine sites. Users should verify support numbers through official company communications before calling.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.darkreading.com/cloud-security/scammers-spread-false-support-info-legitimate-websites"&gt;&lt;i&gt;Read the full story by Kristina Beek on Dark Reading&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Threat group weaponizes GitHub repositories to target security pros"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Threat group weaponizes GitHub repositories to target security pros&lt;/h2&gt;
 &lt;p&gt;Trend Micro researchers identified a new threat group called Water Curse that weaponizes GitHub repositories disguised as legitimate security tools to deliver malware through malicious build scripts.&lt;/p&gt;
 &lt;p&gt;Active since March 2023, the group has used at least 76 GitHub accounts to target cybersecurity professionals, game developers and DevOps teams. The multistage malware can exfiltrate credentials, browser data and session tokens while establishing remote access and persistence. The attack typically begins when victims download compromised open source projects containing embedded malicious code. The code triggers during compilation, deploying VBScript and PowerShell payloads that perform system reconnaissance and data theft.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.darkreading.com/cyberattacks-data-breaches/water-curse-targets-cybersecurity-pros-github-repos"&gt;&lt;i&gt;Read the full story by Elizabeth Montalbano on Dark Reading&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&lt;i&gt; An editor used AI tools to aid in the generation of this news brief. Our expert editors always review and edit content before publishing.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Sharon Shea is executive editor of Informa TechTarget's SearchSecurity site.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Check out the latest security news from the Informa TechTarget team.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/ransom_g1264284948_01.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/news/366626071/News-brief-LOTL-attacks-spoofed-sites-malicious-repositories</link>
            <pubDate>Fri, 20 Jun 2025 14:57:00 GMT</pubDate>
            <title>News brief: LOTL attacks, spoofed sites, malicious repositories</title>
        </item>
        <item>
            <body>&lt;p&gt;A time-based one-time password (TOTP) is a temporary passcode generated by an &lt;a href="https://www.techtarget.com/whatis/definition/algorithm"&gt;algorithm&lt;/a&gt; that uses the current time of day as one of its authentication factors.&lt;/p&gt; 
&lt;p&gt;Time-based &lt;a href="https://www.techtarget.com/searchsecurity/definition/one-time-password-OTP"&gt;one-time passwords&lt;/a&gt; are commonly used for two-factor authentication (&lt;a href="https://www.techtarget.com/searchsecurity/definition/two-factor-authentication"&gt;2FA&lt;/a&gt;), providing a second authentication factor that works for a limited amount of time.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Why are TOTPs important?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why are TOTPs important?&lt;/h2&gt;
 &lt;p&gt;TOTPs provide additional account security. If a user's traditional password is stolen or compromised, an attacker cannot gain account access without the TOTP, which expires quickly.&lt;/p&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="How does a TOTP work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does a TOTP work?&lt;/h2&gt;
 &lt;p&gt;2FA is a &lt;a href="https://www.techtarget.com/searchsecurity/tip/Use-these-6-user-authentication-types-to-secure-networks"&gt;common authentication method&lt;/a&gt; for verifying users' identities. It authenticates users based on two conditions: something they know and something they have. For example, when users log into their bank accounts with their username and password, an SMS message or email with a random code is sent for them to input into the banking service prior to logging them in. The username and password are known to the user, and the random code is sent to a device the user owns.&lt;/p&gt;
 &lt;p&gt;TOTPs typically expire after 30 or 60 seconds.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/whatis-totp.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/whatis-totp_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/whatis-totp_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/whatis-totp.png 1280w" alt="Image of a user entering a time-based one-time password to access their account." height="225" width="279"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;A user inputs a time-based one-time password to verify their identity.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Various methods for users to receive time-based one-time passwords include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/definition/security-token"&gt;Hardware security tokens&lt;/a&gt; that display the password on a small screen.&lt;/li&gt; 
  &lt;li&gt;Mobile authenticator apps, such as &lt;a href="https://www.techtarget.com/searchsecurity/definition/Google-Authenticator"&gt;Google Authenticator&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Text messages sent from a centralized server.&lt;/li&gt; 
  &lt;li&gt;Email messages sent from a centralized server.&lt;/li&gt; 
  &lt;li&gt;Voice messages sent from a centralized server.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;TOTPs can be generated offline when using a mobile authenticator app or a hardware security token. This is ideal for authenticating users with limited internet access.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="What's the difference between time-based and non-time-based OTPs?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What's the difference between time-based and non-time-based OTPs?&lt;/h2&gt;
 &lt;p&gt;Time-based algorithms use the time -- along with a shared secret or token -- to generate a password. Non-time-based algorithms start with a seed value and use &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/hashing"&gt;hash functions&lt;/a&gt; to generate passwords.&lt;/p&gt;
 &lt;p&gt;After the initial password is generated, the prior password is used as input to generate the next password.&lt;/p&gt;
 &lt;p&gt;TOTP is an approved standard (RFC 6238) of the Internet Engineering Task Force (&lt;a href="https://www.techtarget.com/whatis/definition/IETF-Internet-Engineering-Task-Force"&gt;IETF&lt;/a&gt;). Other OTP standards include the &lt;a target="_blank" href="https://tools.ietf.org/html/rfc1760" rel="noopener"&gt;S/KEY One-Time Password System&lt;/a&gt; (RFC 1760), &lt;a target="_blank" href="https://tools.ietf.org/html/rfc2289" rel="noopener"&gt;One-Time Password System&lt;/a&gt; (RFC 2289) and the &lt;a target="_blank" href="https://tools.ietf.org/html/rfc4226" rel="noopener"&gt;HMAC-Based One-Time Password Algorithm&lt;/a&gt; (RFC 4226).&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&lt;em&gt; &lt;/em&gt;&lt;em&gt;Informa TechTarget editors revised this article in 2025 to improve the reader experience.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/3.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/definition/time-based-one-time-password-TOTP</link>
            <pubDate>Mon, 02 Jun 2025 00:00:00 GMT</pubDate>
            <title>What is a time-based one-time password?</title>
        </item>
        <item>
            <body>&lt;p&gt;Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets. The goal of IT security is to protect these assets, devices and services from being disrupted, stolen or exploited by unauthorized users, otherwise known as &lt;a href="https://www.techtarget.com/whatis/definition/threat-actor"&gt;threat actors&lt;/a&gt;. These threats can be external or internal and malicious or accidental in both origin and nature.&lt;/p&gt; 
&lt;p&gt;An effective security strategy uses a range of approaches to minimize vulnerabilities and target many types of cyberthreats. Detection, prevention and response to security threats involve the use of &lt;a href="https://www.techtarget.com/searchsecurity/definition/security-policy"&gt;security policies&lt;/a&gt;, software tools and IT services.&lt;/p&gt; 
&lt;p&gt;Unfortunately, technological innovation benefits both IT defenders and &lt;a href="https://www.techtarget.com/searchsecurity/definition/cybercrime"&gt;cybercriminals&lt;/a&gt;. To protect business assets, companies must routinely review, update and improve security to stay ahead of cyberthreats and increasingly sophisticated cybercriminals.&lt;/p&gt; 
&lt;div class="youtube-iframe-container"&gt;
 &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/w1d81Teltl0?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
&lt;/div&gt; 
&lt;p&gt;IT security consists of two areas: physical and information.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is physical security?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is physical security?&lt;/h2&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchsecurity/definition/physical-security"&gt;Physical security&lt;/a&gt; is the protection of people, hardware, software, network information and data from physical actions, intrusions and other events that could damage an organization and its assets. Safeguarding the physical security of a business means protecting it from threat actors, as well as accidents and natural disasters, such as fires, floods, earthquakes and severe weather. A lack of physical protection could risk the destruction of servers, devices and utilities that support business operations and processes. That said, people are a large part of the physical security threat.&lt;/p&gt;
 &lt;p&gt;Theft and vandalism are examples of human-initiated threats that require physical security solutions. A physical security breach doesn't necessarily require technical knowledge, but it can be just as dangerous as a &lt;a href="https://www.techtarget.com/searchsecurity/definition/data-breach"&gt;data breach&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;There are three parts to physical security:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/definition/access-control"&gt;Access control&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Surveillance.&lt;/li&gt; 
  &lt;li&gt;Testing.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;The success of an organization's physical security program depends on effectively implementing, maintaining and updating each of these components.&lt;/p&gt;
 &lt;h3&gt;Access control&lt;/h3&gt;
 &lt;p&gt;Controlling access to office buildings, research centers, laboratories, data centers and other locations is vital to physical security. An example of a physical security breach is an attacker gaining entry to an organization and using a Universal Serial Bus (&lt;a href="https://www.techtarget.com/searchstorage/definition/USB-drive"&gt;USB&lt;/a&gt;) flash drive to copy and steal data or put &lt;a href="https://www.techtarget.com/searchsecurity/definition/malware"&gt;malware&lt;/a&gt; on the systems.&lt;/p&gt;
 &lt;p&gt;The goal of access control is to record, monitor and limit the number of unauthorized users interacting with sensitive and confidential physical assets. Access control can be as simple as barriers like walls, fences and locked doors. Identification badges and key codes are also part of an effective physical access system. Physical identification is a great way to &lt;a href="https://www.techtarget.com/searchsecurity/definition/user-authentication"&gt;authenticate&lt;/a&gt; the identity of users attempting to access devices and areas reserved for authorized personnel.&lt;/p&gt;
 &lt;p&gt;More sophisticated access control methods include various forms of &lt;a href="https://www.techtarget.com/searchsecurity/definition/biometric-authentication"&gt;biometric authentication&lt;/a&gt;. These security systems use &lt;a href="https://www.techtarget.com/searchsecurity/definition/biometrics"&gt;biometrics&lt;/a&gt;, or unique biological characteristics, to authenticate the identity of authorized users. Fingerprint and &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/facial-recognition"&gt;facial recognition&lt;/a&gt; are two examples of common applications of this technology.&lt;/p&gt;
 &lt;h3&gt;Surveillance&lt;/h3&gt;
 &lt;p&gt;Surveillance involves the technologies and tactics used to &lt;a href="https://www.computerweekly.com/feature/Getting-physical-with-datacentre-security"&gt;monitor activity&lt;/a&gt; in and around facilities and equipment. Many companies install &lt;a href="https://www.techtarget.com/whatis/definition/CCTV-closed-circuit-television"&gt;closed-circuit television&lt;/a&gt; cameras to secure the perimeter of their buildings. These cameras act as both a deterrent to intruders and a tool for incident response and analysis. Cameras, thermal sensors, motion detectors and security alarms are only some examples of surveillance technology.&lt;/p&gt;
 &lt;h3&gt;Testing&lt;/h3&gt;
 &lt;p&gt;Testing is a reliable way to increase physical security. Companies with strong security protocols test their policies to see if they need to be updated or changed. Such tests can include &lt;a href="https://www.techtarget.com/whatis/definition/red-teaming"&gt;red teaming&lt;/a&gt;, where a group of ethical hackers try to infiltrate a company's cybersecurity protocols.&lt;/p&gt;
&lt;/section&gt;              
&lt;section class="section main-article-chapter" data-menu-title="What is information security?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is information security?&lt;/h2&gt;
 &lt;p&gt;Information security is also referred to as information security (&lt;a href="https://www.techtarget.com/searchsecurity/definition/information-security-infosec"&gt;infosec&lt;/a&gt;). It includes strategies for managing the processes, tools and policies that protect both digital and nondigital assets. When implemented effectively, infosec can maximize an organization's ability to prevent, detect and respond to threats.&lt;/p&gt;
 &lt;p&gt;Infosec encompasses several specialized categories of security technology, such as the following:&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/application-security"&gt;Application security&lt;/a&gt; protects applications from threats that seek to manipulate, access, steal, modify or delete software and its related data. Application security uses a combination of software, hardware and policies that are called &lt;i&gt;countermeasures&lt;/i&gt;. Common countermeasures include &lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/application-firewall"&gt;application firewalls&lt;/a&gt;, &lt;a href="https://www.techtarget.com/searchsecurity/definition/encryption"&gt;encryption&lt;/a&gt;, &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/patch-management"&gt;patch management&lt;/a&gt; and biometric authentication systems.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchsecurity/definition/cloud-security"&gt;Cloud security&lt;/a&gt; is a set of policies and technologies designed to protect data and infrastructure in a cloud computing environment. Two key concerns of cloud security are identity and access management and data privacy. &lt;a href="https://www.techtarget.com/searchsecurity/definition/penetration-testing"&gt;Penetration testing&lt;/a&gt;, network protocol maintenance, man-in-the-middle (&lt;a href="https://www.techtarget.com/iotagenda/definition/man-in-the-middle-attack-MitM"&gt;MitM&lt;/a&gt;) detection and application scanning are some tools infosec professionals use to secure information confidentiality.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/cloudsecurity-cloud_security_challenges-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/cloudsecurity-cloud_security_challenges-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/cloudsecurity-cloud_security_challenges-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/cloudsecurity-cloud_security_challenges-f.png 1280w" alt="Cloud security challenges list diagram." height="333" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Cloud security challenges include compliance, misconfiguration and cyberattacks.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Cloud security is a responsibility shared by the cloud service provider (&lt;a href="https://www.techtarget.com/searchitchannel/definition/cloud-service-provider-cloud-provider"&gt;CSP&lt;/a&gt;) and the tenant, or the business that rents infrastructure such as servers and storage. A legal gray zone in cloud security can occur if CSP agreements are not well-constructed. For example, if a tenant's server is compromised by cybercriminals who gain access to another tenant's server, it is not clear who is to blame.&lt;/p&gt;
 &lt;p&gt;Endpoint security requires network nodes to meet certain security standards, like the Federal Information Security Modernization Act, prior to establishing a secure connection. Node devices include personal computers, laptops, tablets, smartphones and equipment such as point-of-sale terminals, barcode readers, sensors and internet of things (IoT) devices.&lt;/p&gt;
 &lt;p&gt;Internet security is the protection of software applications, &lt;a href="https://www.techtarget.com/whatis/definition/browser"&gt;web browsers&lt;/a&gt; and virtual private networks that use the internet. Techniques such as encryption, for example, protect data from attacks such as malware, &lt;a href="https://www.techtarget.com/searchsecurity/definition/phishing"&gt;phishing&lt;/a&gt;, MitM and &lt;a href="https://www.techtarget.com/searchsecurity/definition/denial-of-service"&gt;denial-of-service&lt;/a&gt; attacks.&lt;/p&gt;
 &lt;p&gt;Mobile security is also known as wireless security. &lt;a href="https://www.techtarget.com/whatis/definition/mobile-security"&gt;Mobile security&lt;/a&gt; protects mobile devices such as smartphones, tablets and laptops and the networks they connect to from theft, data leakage and other attacks.&lt;/p&gt;
 &lt;p&gt;Network security defends the network infrastructure and the devices connected to it from threats such as unauthorized access, malicious use and modifications.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/networking-9_elements_netsec-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/networking-9_elements_netsec-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/networking-9_elements_netsec-f_mobile.png 960w,https://www.techtarget.com/rms/onlineImages/networking-9_elements_netsec-f.png 1280w" alt="9 elements of network security diagram." height="581" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Network security includes nine elements, including network firewalls, intrusion prevention systems and SD-WAN security.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Supply chain security protects the network between a company and its suppliers, who often have access to sensitive information such as employee information and intellectual property. The &lt;a href="https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained-Everything-you-need-to-know"&gt;SolarWinds data breach&lt;/a&gt; in 2020 demonstrated how vulnerable organizations can be when supply chain channels are poorly monitored with a lack of &lt;a href="https://www.techtarget.com/searcherp/definition/supply-chain-security"&gt;supply chain security&lt;/a&gt;. SolarWinds is an IT company that manages client networks and systems and has access to the customers' IT. Once hackers infiltrated SolarWinds' update server, they were able to install a virus that acted as a &lt;a href="https://www.techtarget.com/searchsecurity/definition/back-door"&gt;digital backdoor&lt;/a&gt; to client systems and data.&lt;/p&gt;
&lt;/section&gt;             
&lt;section class="section main-article-chapter" data-menu-title="Why is security important?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why is security important?&lt;/h2&gt;
 &lt;p&gt;In an IT context, security is essential for modern-day organizations. The most important reasons for implementing strong security include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Protect sensitive data critical to an organization's operations against cyberthreats.&lt;/li&gt; 
  &lt;li&gt;Prevent disruptions to operational continuity.&lt;/li&gt; 
  &lt;li&gt;Maintain trust by protecting customer and employee data.&lt;/li&gt; 
  &lt;li&gt;Support regulatory compliance and prevent against financial regulatory penalties.&lt;/li&gt; 
  &lt;li&gt;Prevent &lt;a target="_blank" href="https://www.ibm.com/reports/data-breach" rel="noopener"&gt;costly attacks and data breaches&lt;/a&gt;.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/apparch-defense_in_depth_layers-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/apparch-defense_in_depth_layers-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/apparch-defense_in_depth_layers-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/apparch-defense_in_depth_layers-f.png 1280w" alt="Layer of defense-in-depth diagram." height="442" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Defense-in-depth layers are comprised of physical, perimeter and internal network.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Information technology security concepts and principles"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Information technology security concepts and principles&lt;/h2&gt;
 &lt;p&gt;A number of concepts and principles form the foundation of IT security. Some of the most important ones are:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;&lt;b&gt;Application lifecycle management&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/application-lifecycle-management-ALM"&gt;Application lifecycle management&lt;/a&gt; protects all stages of the application development process by reducing exposure to bugs, design flaws and configuration errors.&lt;/li&gt; 
   &lt;li&gt;&lt;b&gt;Defense in depth.&lt;/b&gt; This is a strategy that uses multiple countermeasures simultaneously to protect information. These methods can include endpoint detection and response, antivirus software and kill switches. Defense in depth is based on the military principle that it's more difficult for an enemy to beat a multilayered defense system than a single-layer one.&lt;/li&gt; 
  &lt;/ul&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/security-5_benefits_least_privilege-h.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/security-5_benefits_least_privilege-h_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/security-5_benefits_least_privilege-h_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/security-5_benefits_least_privilege-h.png 1280w" alt="Benefits of using principle of least privilege checklist graphic."&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The five benefits of using the principle of least privilege include the prevention of malware spreading and improved user productivity.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Patch management.&lt;/b&gt; Patches and updates are acquired, tested and installed for flawed code in applications, OSes and firmware.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Principle of least privilege&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; This &lt;a href="https://www.techtarget.com/searchsecurity/definition/principle-of-least-privilege-POLP"&gt;principle of least privilege&lt;/a&gt; strengthens IT security by limiting user and program access to the lowest level of access rights needed for them to do their jobs or functions.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Risk management&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchsecurity/definition/What-is-risk-management-and-why-is-it-important"&gt;Risk management&lt;/a&gt; is the process of identifying, assessing and controlling security risks that threaten an organization's IT environment.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Vulnerability management.&lt;/b&gt; With this approach, security admins routinely check for vulnerabilities by identifying, verifying, mitigating and patching IT security weaknesses as they arise.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;These are some of the most important concepts and principles of IT security and technology. However, combining all these principles doesn't guarantee 100% security for an organization. This is a fundamental problem facing every IT security leader and business. However, by deploying a comprehensive security strategy, organizations can defend against physical and infosec threats.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Types of cybersecurity"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Types of cybersecurity&lt;/h2&gt;
 &lt;p&gt;An effective cybersecurity strategy involves various tools and methods. The most common include:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Firewalls.&lt;/b&gt; Firewalls are the barriers between an internal barrier and potential threats from external networks. Firewalls implement security rules that filter incoming and outgoing traffic.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Anitvirus and antimalware.&lt;/b&gt; Antivirus and antimalware detect, isolate and remove malicious software like viruses, ransomware and spyware, protecting devices and networks from infections.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Encryption&lt;/b&gt;. Encryption converts readable data into coded, or encrypted, formats that only authorized users can decrypt, ensuring privacy and confidentiality.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Intrusion detection and prevention systems (IDPS).&lt;/b&gt; These &lt;a href="https://www.techtarget.com/searchsecurity/definition/intrusion-detection-system"&gt;intrusion detection&lt;/a&gt; and prevention systems monitor network traffic for unusual patterns that may indicate security breaches and can automatically take action to block or report potential intrusions.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Multifactor authentication.&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchsecurity/definition/multifactor-authentication-MFA"&gt;MFA&lt;/a&gt; requires multiple forms of verification before granting access, reducing the risk of unauthorized access even if passwords are compromised.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Virtual private networks.&lt;/b&gt; VPNs create a secure, encrypted connection over the internet, protecting data in transit and ensuring privacy.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security information and event management.&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchsecurity/definition/security-information-and-event-management-SIEM"&gt;SIEM&lt;/a&gt; gathers, analyzes and reports on security-related data from across the network, providing visibility into potential threats and assisting in swift responses.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Data loss prevention. &lt;/b&gt;DLP monitors and controls data transfers, ensuring sensitive information does not leave secure environments.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Network segmentation.&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchnetworking/definition/network-segmentation"&gt;Network segmentation&lt;/a&gt; divides networks into smaller parts, reducing the risk of attacks spreading, and allows security teams to isolate issues.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-1" src="https://www.youtube.com/embed/1SVlUJ1lk5I?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Cybersecurity vs. infosec"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Cybersecurity vs. infosec&lt;/h2&gt;
 &lt;p&gt;Considering information security's intersection with endpoint, IoT and network security, it can be &lt;a href="https://www.techtarget.com/searchnetworking/answer/What-are-the-differences-between-network-security-vs-cybersecurity"&gt;difficult to separate information security from cybersecurity&lt;/a&gt;; however, there are distinct differences. One difference is geopolitical issues. Cybersecurity can refer to the defense mechanisms that protect a country or a government's data from &lt;a href="https://www.techtarget.com/searchsecurity/definition/cyberwarfare"&gt;cyberwarfare&lt;/a&gt;. This is because cybersecurity includes the protection of data and its related technologies from threats.&lt;/p&gt;
 &lt;p&gt;Information security, on the other hand, focuses on ensuring information is available, remains confidential and maintains its integrity.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Learn more about the &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchsecurity/feature/Top-10-types-of-information-security-threats-for-IT-teams"&gt;&lt;i&gt;threats to information security&lt;/i&gt;&lt;/a&gt;&lt;i&gt; that enterprise IT is facing today.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/3.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/definition/security</link>
            <pubDate>Fri, 30 May 2025 16:15:00 GMT</pubDate>
            <title>What is security?</title>
        </item>
        <item>
            <body>&lt;p&gt;The challenges of enterprise cybersecurity are well known, yet data breaches, third-party compromises and other cyberattacks continue to wreak havoc.&lt;/p&gt; 
&lt;p&gt;PwC, which surveyed more than 4,000 business and tech leaders for its "2025 Global Digital Trust Insights," &lt;a target="_blank" href="https://www.pwc.com/us/en/services/consulting/cybersecurity-risk-regulatory/library/global-digital-trust-insights.html" rel="noopener"&gt;reported&lt;/a&gt; that "what worries organisations most is what they're least prepared for." The top five threats cited by respondents -- cloud-related threats, hack-and-leak operations, third-party breaches, connected device attacks and ransomware -- also ranked among the top issues that security leaders claimed they felt the least prepared to address.&lt;/p&gt; 
&lt;p&gt;History has proved that these concerns are justified, and this past week's news highlighted just how prevalent such issues are. The following companies are a few of the many that made headlines for data breaches, data leaks and attacks.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="IT management software vendor ConnectWise"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;IT management software vendor ConnectWise&lt;/h2&gt;
 &lt;p&gt;ConnectWise disclosed a breach targeting customers of its ScreenConnect remote monitoring and management software. The company attributed the attack to a "sophisticated nation state actor." ConnectWise engaged Mandiant for forensic investigation and notified affected customers and law enforcement.&lt;/p&gt;
 &lt;p&gt;ConnectWise said it implemented enhanced monitoring and hardening measures. Details remain limited about the attack scope and number of affected customers.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.darkreading.com/cyberattacks-data-breaches/connectwise-breached-screenconnect-customers-targeted"&gt;&lt;i&gt;Read the full story by Rob Wright on Dark Reading&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Risk management services firm LexisNexis"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Risk management services firm LexisNexis&lt;/h2&gt;
 &lt;p&gt;LexisNexis Risk Solutions (LNRS) is facing a third-party data leak affecting more than 360,000 customers. The breach, which was discovered on April 1, but occurred on Dec. 25, 2024, involved an unauthorized individual accessing LNRS customer data from a third-party platform.&lt;/p&gt;
 &lt;p&gt;Compromised data could include names, contact details, Social Security numbers, driver's license numbers and birth dates. LNRS' own networks were unaffected.&lt;/p&gt;
 &lt;p&gt;LNRS notified law enforcement, launched an investigation, and is offering affected users free identity protection and credit monitoring for up to two years. No evidence of data misuse has been reported, and no threat group has claimed responsibility.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.darkreading.com/cyberattacks-data-breaches/lexisnexis-360k-customers-third-party-data-leak"&gt;&lt;i&gt;Read the full story by Kristina Beek on Dark Reading&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Retailer Victoria's Secret"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Retailer Victoria's Secret&lt;/h2&gt;
 &lt;p&gt;Victoria's Secret took its U.S. website offline following an unspecified "security incident," while its U.K. site remained operational and physical stores continued business as usual.&lt;/p&gt;
 &lt;p&gt;The company said it implemented response protocols and engaged third-party experts to address the incident. Online customer services, including online returns and customer care, were temporarily unavailable. No details about the nature, scope, timing or potential data compromise have been provided.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.darkreading.com/endpoint-security/victoria-secret-website-security-incident"&gt;&lt;i&gt;Read the full story by Kristina Beek on Dark Reading&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Telecom provider Cellcom"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Telecom provider Cellcom&lt;/h2&gt;
 &lt;p&gt;Cellcom has nearly restored calling and texting services after a cyberattack forced it to take its network offline on May 14, leaving Wisconsin and Michigan customers' devices in SOS mode for nearly a week.&lt;/p&gt;
 &lt;p&gt;CEO Brighid Riordan confirmed that the company had notified the FBI and begun an investigation. She said there was no evidence that customer data was compromised, as the attack targeted a separate network area. While Cellcom said services were "performing well for most customers" as of Tuesday, some intermittent issues persisted.&lt;/p&gt;
 &lt;p&gt;Security experts have suggested that the incident might have been a DDoS attack, noting that telecom providers are frequent targets for service disruption and cyberespionage.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.darkreading.com/cyberattacks-data-breaches/cellcom-restores-regional-mobile-services-cyberattack"&gt;&lt;i&gt;Read the full story by Elizabeth Montalbano on Dark Reading&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Software vendor MathWorks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Software vendor MathWorks&lt;/h2&gt;
 &lt;p&gt;MathWorks, creator of Matlab and Simulink, disclosed a ransomware attack that began on May 18. The attack affected both customer-facing online applications and internal systems. The company initially reported "an issue with multiple applications" and later revealed more affected services, including ThingSpeak, Cloud Center and Matlab Mobile.&lt;/p&gt;
 &lt;p&gt;By May 21, the company had restored single sign-on and MFA, but some authentication services remained degraded. MathWorks is working with cybersecurity experts to restore remaining systems and has notified federal law enforcement. The ransomware group responsible for the attack remains unidentified, and it's unclear if any data was stolen.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.darkreading.com/vulnerabilities-threats/mathworks-confirms-ransomware-attack"&gt;&lt;i&gt;Read the full story by Kristina Beek on Dark Reading&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Retailer Adidas"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Retailer Adidas&lt;/h2&gt;
 &lt;p&gt;Adidas confirmed that it suffered a data breach through a third-party customer service provider. Affected data included contact information of customers who previously interacted with the company's help desk. No passwords, credit cards or other financial information was compromised.&lt;/p&gt;
 &lt;p&gt;The company said it is notifying affected consumers and authorities while investigating the incident with security experts. The third-party customer service provider remains unnamed, and the attackers' identity is unknown.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.darkreading.com/vulnerabilities-threats/adidas-victim-third-party-data-breach"&gt;&lt;i&gt;Read the full story by Kristina Beek on Dark Reading&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Unnamed MSP"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Unnamed MSP&lt;/h2&gt;
 &lt;p&gt;The DragonForce ransomware gang conducted a supply chain attack by exploiting three vulnerabilities in SimpleHelp, a remote monitoring and management tool used by MSPs.&lt;/p&gt;
 &lt;p&gt;According to Sophos research published this week, the attackers compromised an MSP's SimpleHelp instance to deploy ransomware to multiple downstream customers. SimpleHelp said it patched the vulnerabilities -- tracked as CVE-2024-57727, CVE-2024-57728 and CVE-2024-57726 -- within 48 hours of notification.&lt;/p&gt;
 &lt;p&gt;DragonForce, which emerged in 2023, is gaining popularity in the criminal ecosystem due to its unique "customer-centric" model that enables affiliates to use their own branding while using DragonForce's infrastructure.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.darkreading.com/application-security/dragonforce-ransomware-msp-supply-chain-attack"&gt;&lt;i&gt;Read the full story by Alexander Culafi on Dark Reading&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Third-party risk management resources"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Third-party risk management resources&lt;/h2&gt;
 &lt;p&gt;Learn more about how to manage risks related to third parties here:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-build-an-effective-third-party-risk-assessment-framework"&gt;How to build an effective third-party risk assessment framework&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-create-a-third-party-risk-management-policy"&gt;How to create a third-party risk management policy&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-manage-third-party-risk-in-the-cloud"&gt;How to manage third-party risk in the cloud&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searcherp/feature/5-supply-chain-cybersecurity-risks-and-best-practices"&gt;Cybersecurity risks and challenges in supply chain&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/Why-fourth-party-risk-management-is-a-must-have"&gt;Why fourth-party risk management is a must-have&lt;/a&gt;&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&lt;i&gt; An editor used AI tools to aid in the generation of this news brief. Our expert editors always review and edit content before publishing.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Sharon Shea is executive editor of Informa TechTarget's SearchSecurity site.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Check out the latest security news from the Informa TechTarget team.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_a303249453.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/news/366625254/News-brief-Weeks-top-breaches-stem-from-third-party-attacks</link>
            <pubDate>Fri, 30 May 2025 15:56:00 GMT</pubDate>
            <title>News brief: Week's top breaches stem from third-party attacks</title>
        </item>
        <item>
            <body>&lt;p&gt;A passkey is an alternative user authentication method that eliminates the need for usernames and passwords. Rather than relying on old login methods susceptible to &lt;a href="https://www.techtarget.com/searchsecurity/definition/phishing"&gt;phishing&lt;/a&gt; or hacking attacks, &lt;a href="https://www.techtarget.com/searchsecurity/definition/keylogger"&gt;keyloggers&lt;/a&gt;, data breaches and other security flaws, websites and applications can use passkeys to verify a user's login credentials. Passkeys are only stored on the user's device, so there is no password that could be intercepted by potential scammers.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.techtarget.com/searchitoperations/podcast/Cybersecurity-expertise-gaps-More-than-meets-the-eye"&gt;Cybersecurity professionals&lt;/a&gt; have long stressed the importance of strong passwords to prevent security vulnerabilities. However, because web users often create weak passwords or reuse passwords, two-factor authentication (&lt;a href="https://www.techtarget.com/searchsecurity/definition/two-factor-authentication"&gt;2FA&lt;/a&gt;) was developed. This adds a security checkpoint by confirming a user login with a phone call, text message or email containing a code sent to the user. The user then enters this code to complete the login process. Unfortunately, bad actors have found their way around 2FA and the standard login process. Because password technology is inherently vulnerable to phishing and other attacks designed to &lt;a href="https://www.techtarget.com/searchsecurity/definition/credential-theft"&gt;steal or bypass credentials&lt;/a&gt;, 2FA has only made things marginally more difficult for fraudsters.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="How does a passkey work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does a passkey work?&lt;/h2&gt;
 &lt;p&gt;When a user attempts to log into a site that uses passkey technology, the site sends a &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/push-notification"&gt;push notification&lt;/a&gt; to the smartphone they used when they registered their account. When they use their face, fingerprint or personal identification number (PIN) to unlock their device, it creates a unique passkey and communicates it to the website they are trying to access. At that point, the user is logged in, all without their login information or biometric data being transmitted using a potentially insecure Wi-Fi connection or needing to be typed out.&lt;/p&gt;
 &lt;p&gt;Unlike 2FA, which uses Wi-Fi or other methods for user verification, passkeys use &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/Bluetooth"&gt;Bluetooth&lt;/a&gt;. Bluetooth checks to ensure the device logging in is nearby, further limiting the chances of a scammer or hacker accessing the user's account.&lt;/p&gt;
 &lt;p&gt;Passkeys, which are based on the &lt;a href="https://www.techtarget.com/searchsecurity/definition/WebAuthn-API"&gt;Web Authentication API&lt;/a&gt;, only work for the website on which they were created. They are then stored on the user's device instead of on a physical or cloud-based server.&lt;/p&gt;
 &lt;p&gt;To date, Apple offers the most thorough explanation of how passkeys work within its tech ecosystem. Its iCloud Keychain service stores its cryptographic keys in a rate-limited way to prevent &lt;a href="https://www.techtarget.com/searchsecurity/definition/brute-force-cracking"&gt;brute-force attacks&lt;/a&gt;. The keys are recoverable even if a user's devices are lost or compromised. Those new to the Apple world and setting up their first iOS device must set up 2FA first. To add a new device, the user needs their Apple ID password and the six-digit code sent to another trusted device or phone number using a push notification.&lt;/p&gt;
 &lt;p&gt;For example, an iPhone user would set up 2FA the first time they use it and establish their Apple ID. When they want to make a purchase or complete some other secure transaction, they must enter their Apple ID password and check their iPhone -- or whatever device they used to set up their 2FA authentication initially -- for the six-digit code sent to them. When they enter the code, the new device is added to what Apple calls the &lt;i&gt;circle of trust&lt;/i&gt; formed by the iCloud Keychain. This circle acts like a chain, and the devices represent links added to the chain as they are set up.&lt;/p&gt;
 &lt;p&gt;When the user needs to log into a website on a computer they do not usually use -- regardless of whether it's an Apple, Google or Microsoft product -- with passkey technology enabled, the login screen on the website provides a &lt;a href="https://www.techtarget.com/whatis/definition/QR-code-quick-response-code"&gt;quick response code&lt;/a&gt; for them to scan with their phone. With Bluetooth enabled on their phone and the phone within Bluetooth frequency range of the device they're trying to log in on, they will receive a push notification &lt;a href="https://www.techtarget.com/whatis/feature/Palm-scanning-tech-explained-Everything-you-need-to-know"&gt;to use biometric identification&lt;/a&gt; or a PIN on their phone. Once they do that, their phone will give the website the all-clear and allow the user to log in.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="The origin of passkeys"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The origin of passkeys&lt;/h2&gt;
 &lt;p&gt;The passkey idea first took hold in 2009, when Validity Sensors -- acquired by Synaptics in 2013 -- and PayPal jointly developed the concept of using biometrics instead of passwords for online identification.&lt;/p&gt;
 &lt;p&gt;Along with several other tech leaders, they founded the &lt;a target="_blank" href="https://fidoalliance.org/" rel="noopener"&gt;FIDO (Fast Identity Online) Alliance&lt;/a&gt;, a web security collective, in July 2012. FIDO publicly announced its initiatives in February 2013. Google joined in April 2013. In February 2014, PayPal and Samsung launched the first public deployment of FIDO authentication with Samsung's Galaxy S5 smartphone. Users of the device could, for the first time, authenticate PayPal with a finger swipe and shop online without having to enter a password to complete the transaction payment.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/passkey_adoption_the_shift_toward_passwordless_authentication-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/passkey_adoption_the_shift_toward_passwordless_authentication-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/passkey_adoption_the_shift_toward_passwordless_authentication-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/passkey_adoption_the_shift_toward_passwordless_authentication-f.png 1280w" alt="An image showing passkey adoption statistics per the FIDO Alliance." height="465" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The FIDO Alliance's survey 'Consumer Password &amp;amp; Passkey Trends' shows the growing use of passkeys versus passwords.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Is a passkey more secure than a password?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Is a passkey more secure than a password?&lt;/h2&gt;
 &lt;p&gt;Because every passkey is unique, they tend to be more secure than passwords because they cannot be reused across multiple sites and platforms. And because passkeys are generated automatically, users do not need to rely on passwords that are either easy to remember -- and unfortunately, easy for others to guess -- or so complicated that they are easily forgotten.&lt;/p&gt;
 &lt;p&gt;Because passkeys use end-to-end &lt;a href="https://www.techtarget.com/searchsecurity/definition/encryption"&gt;encryption&lt;/a&gt;, not even the companies creating them can see or change them. Apple says its passkeys use public key cryptography and create two keys. One key is public and stored on the website's server; the other is private and stored on the user's device, so it is only accessible to that user.&lt;/p&gt;
 &lt;p&gt;This means that the private keys generated in each passkey pair are only stored on the user's device, not on any website's server, making it impossible for the user's login information to be discovered through a data breach or hacking attempt. A hacker could only access the public key, which would be useless to them because it would not grant access to the user's account information. Even if someone were to fall prey to a phishing link in an email or text message, the effort would fail because the passkey on the user's device would only work with the website that created it.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/hWYhPOxpgkI?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Companies that use passkeys"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Companies that use passkeys&lt;/h2&gt;
 &lt;p&gt;Awareness of passkey technology has accelerated. At the FIDO Alliance May 2022 conference, Apple, Google and Microsoft publicly announced a major initiative to promote passkeys as a &lt;a href="https://www.techtarget.com/searchsecurity/definition/passwordless-authentication"&gt;passwordless authentication&lt;/a&gt; standard, and Apple followed through in June 2022 by announcing a new passkey feature. This feature debuted in iOS 16 and macOS Ventura, was integrated into the iPhone 14, and is part of subsequent releases.&lt;/p&gt;
 &lt;p&gt;The Apple passkey feature uses existing iOS technology powering its Touch ID and Face ID features. Websites that support passkeys enable users to create accounts and log in using their fingerprint or facial image instead of a password to authenticate their credentials. Apple passkeys use the iCloud Keychain password management system to back up passkeys and sync them across all a user's Apple devices. This means users can create a passkey for a website while on their phone and then use that same passkey to log in to that website later while using an iPad, for example.&lt;/p&gt;
 &lt;p&gt;Google passkeys use similar fingerprint and facial image passkeys on Chrome browsers, Android devices and Google accounts, including Gmail and Drive.&lt;/p&gt;
 &lt;p&gt;Microsoft includes passkeys on its Windows 10 and 11 operating systems through the Windows Hello program. This program enables users to log in with a PIN and &lt;a href="https://www.techtarget.com/searchsecurity/definition/biometric-authentication"&gt;biometric authentication&lt;/a&gt;, such as a fingerprint or a facial image. Passkeys are also available on Microsoft 365, Copilot and Xbox accounts. These services support passkey backups and device synchronization.&lt;/p&gt;
 &lt;p&gt;In addition to Apple, Google and Microsoft, hundreds of other companies -- including GitHub, Facebook, Instacart, Kayak, Verizon and Zoho -- use passkeys, and the list is growing.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/security-biometric_authentication_types.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/security-biometric_authentication_types_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/security-biometric_authentication_types_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/security-biometric_authentication_types.png 1280w" alt="A chart showing the different types of biometrics that can be used for authentication." height="608" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Biometric identification is used in conjunction with a passkey to authenticate a user.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="The call for a passkey standard"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The call for a passkey standard&lt;/h2&gt;
 &lt;p&gt;Going forward, security professionals are advocating for implementing standards that will prevent or at least discourage vendor lock-in. The concern is about what happens with existing passkeys if a user switches from one vendor's product to another.&lt;/p&gt;
 &lt;p&gt;Some vendors have addressed this problem with workarounds. For example, Apple enables an existing passkey for an iPhone to be used on another device with Google Chrome running on either iOS 16 or later or on a Windows machine.&lt;/p&gt;
 &lt;p&gt;It remains to be seen if standardization efforts are successful, but creating new passkeys is so easy and almost entirely automated that users should be able to easily establish credentials on a new device from a different vendor.&lt;/p&gt;
 &lt;p&gt;The &lt;a href="https://fidoalliance.org/design-system/" target="_blank" rel="noopener"&gt;FIDO Alliance Design System&lt;/a&gt; and other methodologies published by the alliance should help encourage standardization.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Passkey use is growing"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Passkey use is growing&lt;/h2&gt;
 &lt;p&gt;Much of passkey's underlying technology has already been integrated into everyday tech life, such as 2FA and biometric authentication that rely on a user's face or fingerprint to unlock a device or otherwise provide authentication.&lt;/p&gt;
 &lt;p&gt;Growing security vulnerabilities and password management issues are prompting many organizations to abandon password use in favor of passkeys. Users are also becoming increasingly frustrated with managing a multitude of different passwords, forcing a shift toward more secure alternatives like passkeys.&lt;/p&gt;
 &lt;p&gt;In September 2024 and April 2025, the FIDO Alliance Working Group commissioned a survey regarding passkey deployments worldwide. It found that &lt;a target="_blank" href="https://fidoalliance.org/new-fido-alliance-research-shows-87-percent-us-uk-workforces-are-deploying-passkeys-for-employee-sign-ins/" rel="noopener"&gt;87%&lt;/a&gt; of the decision-makers surveyed have deployed passkeys at their organizations with 47% having rolled out a mix of physical security keys, cards and synced passkeys.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Learn &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchsecurity/answer/Authentication-vs-digital-identity-Whats-the-difference"&gt;&lt;i&gt;how identity management and authentication compare&lt;/i&gt;&lt;/a&gt;&lt;i&gt; as part of an identity and access management framework.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A passkey is an alternative user authentication method that eliminates the need for usernames and passwords.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/6.jpg</image>
            <link>https://www.techtarget.com/whatis/definition/passkey</link>
            <pubDate>Wed, 21 May 2025 12:00:00 GMT</pubDate>
            <title>What is a passkey?</title>
        </item>
        <item>
            <body>&lt;p&gt;Patch management is one of the oldest and most well-known IT and security tasks, but it remains a bane of admins' existence. From buggy patches and time-consuming processes to fears of business downtime and &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-remote-work-is-changing-patch-management"&gt;increased complexity due to remote workers&lt;/a&gt;, patch management isn't the easiest task for IT and security professionals.&lt;/p&gt; 
&lt;p&gt;Yet it is a constant worry.&lt;/p&gt; 
&lt;p&gt;Fifty-four percent of Ponemon Institute's "2024 State of Cyber Risk in the Age of AI" respondents cited unpatched vulnerabilities as the top cyber-risk at their organization. And it's no surprise why -- as of the writing of this article, NIST's National Vulnerability Database has received an average of 136 new CVEs a day this year.&lt;/p&gt; 
&lt;p&gt;While not all vulnerabilities are critical, teams must be aware of them. Here are three that made the news this week.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="SAP NetWeaver vulnerability under attack by APT and ransomware groups"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;SAP NetWeaver vulnerability under attack by APT and ransomware groups&lt;/h2&gt;
 &lt;p&gt;A critical vulnerability, CVE-2025-31324, in SAP NetWeaver's Visual Composer development software is under attack by ransomware groups and Chinese advanced persistent threat actors. The flaw, which has a CVSS score of 9.8, enables unauthenticated &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/remote-code-execution-RCE"&gt;remote code execution&lt;/a&gt;. Initially reported by cybersecurity company ReliaQuest on April 22, the vulnerability has attracted multiple threat actors. SAP released an emergency patch on April 24, but attackers continue to exploit it.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.darkreading.com/vulnerabilities-threats/critical-sap-netweaver-vuln-cyberattacks"&gt;&lt;i&gt;Read the full story by Kristina Beek on Dark Reading&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Samsung MagicINFO Server PoC under exploit"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Samsung MagicINFO Server PoC under exploit&lt;/h2&gt;
 &lt;p&gt;Threat actors are actively exploiting a critical vulnerability, CVE-2025-4632, in Samsung's digital signage management product. The MagicINFO Server 9 flaw, which received a CVSS score of 9.8, enables attackers to write arbitrary files with system authority. Bug disclosure group SSD Secure Disclosure reported the issue to Samsung on January 12 and published a proof of concept (PoC) on April 30. Security companies Arctic Wolf and Huntress observed exploitation attempts in early May, with some attacks linked to Mirai botnet activities. Samsung issued a hotfix on May 8, though researchers noted that the patch requires installation of a specific previous version first. The PoC bypasses versions patched against CVE-2024-7399, a restricted directory vulnerability disclosed and patched last year.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;&lt;a href="https://www.darkreading.com/endpoint-security/attackers-target-samsung-magicinfo-server-bug"&gt;Read the full story by Alexander Culafi on Dark Reading&lt;/a&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Chat app vulnerability exploited months after patch released"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Chat app vulnerability exploited months after patch released&lt;/h2&gt;
 &lt;p&gt;A Turkish cyberespionage group known as Sea Turtle has been exploiting a critical vulnerability in Output Messenger to spy on Kurdish military forces in Iraq since April 2024, Microsoft reported. The messaging app, marketed as a private, secure enterprise messaging service, was compromised using &lt;a href="https://www.techtarget.com/searchsecurity/tip/Types-of-DNS-attacks-and-how-to-prevent-them"&gt;DNS hijacking&lt;/a&gt; or typosquatting to gain users' credentials. The attackers exploited a directory traversal vulnerability to plant backdoors that enabled them to intercept communications. Output Messenger's developer, Srimax, said it patched this issue on Dec. 25, but Microsoft reported that unpatched systems continue to be targeted.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.darkreading.com/cyberattacks-data-breaches/turkish-apt-exploits-chat-app-zero-day-spy-iraqi-kurds"&gt;&lt;i&gt;Read the full story by Nate Nelson on Dark Reading&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Patch management resources"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Patch management resources&lt;/h2&gt;
 &lt;p&gt;Learn more about enterprise patch management here:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/5-enterprise-patch-management-best-practices"&gt;10 enterprise patch management best practices&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/answer/Testing-a-security-patch"&gt;Key software patch testing best practices&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/Security-patch-validation-and-verification"&gt;How to conduct security patch validation and verification&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Use-this-10-step-patch-management-process-to-ensure-success"&gt;An 11-step patch management process to ensure success&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Creating-a-patch-management-policy-Step-by-step-guide"&gt;Creating a patch management policy: Step-by-step guide&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/Automated-patch-management-Best-practices-for-success"&gt;Automated patch management: 9 best practices for success&lt;/a&gt;&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&lt;i&gt; An editor used AI tools to aid in the generation of this news brief. Our expert editors always review and edit content before publishing.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Sharon Shea is executive editor of Informa TechTarget's SearchSecurity site.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Check out the latest security news from the Informa TechTarget team.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_a303249453.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/news/366623968/News-brief-Patch-critical-SAP-Samsung-and-chat-app-flaws-now</link>
            <pubDate>Fri, 16 May 2025 17:43:00 GMT</pubDate>
            <title>News brief: Patch critical SAP, Samsung and chat app flaws now</title>
        </item>
        <item>
            <body>&lt;p&gt;A penetration test, also called a &lt;i&gt;pen test&lt;/i&gt; is a simulated &lt;a href="https://www.techtarget.com/searchsecurity/definition/cyber-attack"&gt;cyberattack&lt;/a&gt; on a computer system, network or application to identify and highlight vulnerabilities in an organization's &lt;a href="https://www.techtarget.com/searchsecurity/definition/security-posture"&gt;security posture&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;Also known as &lt;i&gt;ethical hacking&lt;/i&gt;, these tests are often carried out by &lt;a href="https://www.techtarget.com/searchsecurity/definition/ethical-hacker"&gt;ethical hackers&lt;/a&gt;. These in-house employees or third parties mimic the strategies and actions of an attacker to evaluate the hackability of an organization's computer systems, network or web applications. Organizations can also use pen testing to evaluate their adherence to compliance regulations.&lt;/p&gt; 
&lt;p&gt;Penetration testing is considered a &lt;a href="https://www.techtarget.com/searchsecurity/feature/Build-a-proactive-cybersecurity-approach-that-delivers"&gt;proactive cybersecurity measure&lt;/a&gt; because it involves consistent, self-initiated improvements based on the reports the test generates. This differs from nonproactive approaches, which don't fix weaknesses as they arise. A nonproactive approach to cybersecurity, for example, would involve a company updating its &lt;a href="https://www.techtarget.com/searchsecurity/definition/firewall"&gt;firewall&lt;/a&gt; after a &lt;a href="https://www.techtarget.com/searchsecurity/definition/data-breach"&gt;data breach&lt;/a&gt; occurs.&lt;/p&gt; 
&lt;p&gt;The goal of proactive measures, such as pen testing, is to minimize the number of retroactive upgrades and maximize an organization's security.&lt;/p&gt; 
&lt;div class="youtube-iframe-container"&gt;
 &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/TA0TbzyU8GY?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
&lt;/div&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Why is pen testing important?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why is pen testing important?&lt;/h2&gt;
 &lt;p&gt;A test run of a cyberattack, a penetration test offers insights into the most vulnerable aspects of a system. It also serves as a mitigation technique, enabling organizations to close the identified loopholes before threat actors get to them.&lt;/p&gt;
 &lt;p&gt;The following are four reasons why organizations should conduct pen testing:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Risk assessment. &lt;/b&gt;The rate of distributed denial of service (&lt;a href="https://www.techtarget.com/searchsecurity/definition/denial-of-service"&gt;DoS&lt;/a&gt;), &lt;a href="https://www.techtarget.com/searchsecurity/definition/phishing"&gt;phishing&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchsecurity/definition/ransomware"&gt;ransomware&lt;/a&gt; attacks is dramatically increasing, putting most companies at risk. Considering how reliant businesses are on technology, the consequences of a &lt;a href="https://www.techtarget.com/searchsecurity/news/252500684/DarkSide-The-ransomware-gang-that-took-down-a-pipeline"&gt;successful cyberattack&lt;/a&gt; have never been greater. A ransomware attack, for instance, could block a company from accessing the data, devices, networks and servers it relies on to conduct business. Such an attack could result in millions of dollars of lost revenue. Pen testing uses the hacker perspective to identify and mitigate cybersecurity risks before they're exploited. This helps IT leaders perform informed security upgrades that minimize the possibility of successful attacks.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security awareness.&lt;/b&gt; As technology continues to evolve, so do the methods cybercriminals use. For companies to successfully protect themselves and their assets from these attacks, they need to be able to update their security measures at the same rate. The caveat, however, is that it's often difficult to know which methods cybercriminals are using and how they might be used in an attack. But by using skilled ethical hackers, organizations can quickly and effectively identify, update and replace the parts of their systems that are particularly susceptible to modern hacking techniques.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Reputation.&lt;/b&gt; A data breach can put a company's reputation at stake, especially if it goes public. Customers can lose confidence in the business and stop buying its products, while investors might be hesitant to invest in a business that doesn't take its cyberdefense seriously. Penetration testing protects the reputation of a business by offering proactive mitigation approaches.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Compliance.&lt;/b&gt; Industries such as healthcare, banking and service providers take compliance and regulation seriously and include pen testing as part of their compliance efforts. Common regulations such as &lt;a href="https://www.techtarget.com/searchsecurity/tip/Pen-testing-guide-Types-steps-methodologies-and-frameworks"&gt;System and Organization Controls 2&lt;/a&gt;, the &lt;a href="https://www.techtarget.com/searchhealthit/definition/HIPAA"&gt;Health Insurance Portability and Accountability Act&lt;/a&gt; and the &lt;a href="https://www.techtarget.com/searchsecurity/definition/PCI-DSS-Payment-Card-Industry-Data-Security-Standard"&gt;Payment Card Industry Data Security Standard&lt;/a&gt; require pen tests to be compliant. Therefore, by performing regularly scheduled pen testing, organizations can stay on top of their compliance needs.&lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Benefits of penetration testing"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Benefits of penetration testing&lt;/h2&gt;
 &lt;p&gt;Penetration testing offers a wide range of benefits for organizations looking to improve their security posture and resilience. Here are some common benefits of conducting penetration testing:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Identification and prioritization of vulnerabilities.&lt;/b&gt; Penetration tests provide a deeper analysis than automated scans, revealing complex and exploitable weaknesses in systems, networks and applications. They also help classify and prioritize vulnerabilities according to their potential effects and ease of exploitation, enabling organizations to concentrate their remediation efforts on the most significant issues.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Real-world security assessment.&lt;/b&gt; By simulating actual attack scenarios, pen testing offers a realistic evaluation of an organization's security posture. This helps identify weaknesses in defense mechanisms and provides a better understanding of how an attacker might succeed when trying to infiltrate a system.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Improved security controls and processes.&lt;/b&gt; The findings of a penetration test offer organizations the information needed to fine-tune their security defenses, such as firewalls, &lt;a href="https://www.techtarget.com/searchsecurity/definition/intrusion-detection-system"&gt;intrusion detection systems&lt;/a&gt; and access management. Additionally, it helps facilitate improvements to the security guidelines, operational processes and overall security architecture of the organization.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Business continuity and reduced downtime. &lt;/b&gt;Pen testing can uncover weaknesses that could lead to system failures or disruptions. Addressing these vulnerabilities helps ensure &lt;a href="https://www.techtarget.com/searchdisasterrecovery/definition/business-continuity"&gt;business continuity&lt;/a&gt; and minimizes potential downtime caused by security incidents.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cost savings.&lt;/b&gt; Proactively addressing vulnerabilities through penetration testing is more cost-effective than dealing with the aftermath of a cyberattack. Penetration testing helps organizations identify and &lt;a href="https://www.techtarget.com/searchsecurity/tip/Close-security-gaps-with-attack-path-analysis-and-management"&gt;close security gaps&lt;/a&gt; before they're exploited, thereby preventing the financial losses associated with data breaches and system downtime.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Who performs penetration tests?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Who performs penetration tests?&lt;/h2&gt;
 &lt;p&gt;Pen testing is typically performed by pen testers known as ethical hackers. These ethical hackers are IT experts who use hacking methods to help companies identify possible entry points into their infrastructure. By using different methodologies, tools and approaches, organizations can perform simulated cyberattacks to test the strengths and weaknesses of their existing security systems. &lt;i&gt;Penetration&lt;/i&gt;, in this case, refers to the degree to which a hypothetical threat actor, or hacker, can penetrate an organization's cybersecurity measures and protocols.&lt;/p&gt;
 &lt;p&gt;Most pen testers are experienced developers or security professionals with &lt;a href="https://www.techtarget.com/searchsecurity/feature/On-a-penetration-tester-career-path-flexibility-and-curiosity-are-key"&gt;advanced credentials and pen testing certifications&lt;/a&gt;. It's always best to hire penetration testers who have little to no experience with the system they're trying to infiltrate. For example, a developer performing pen testing on their own source code might miss a few blind spots that a tester from outside can catch.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Team methodology in penetration testing"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Team methodology in penetration testing&lt;/h2&gt;
 &lt;p&gt;In penetration testing, the team methodology refers to the structured approach and collaboration among various specialized groups or teams to simulate real-world cyberattacks or exercises effectively. Here's a breakdown of common teaming approaches and &lt;a href="https://www.techtarget.com/searchsecurity/answer/What-is-red-and-white-hat-hacking"&gt;types of ethical hackers&lt;/a&gt;:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Red team.&lt;/b&gt; The &lt;a href="https://www.techtarget.com/whatis/definition/red-teaming"&gt;red team&lt;/a&gt; is the core penetration testing team that simulates real-world attackers. Their goal is to identify and exploit vulnerabilities to gain unauthorized access, mimicking the tactics, techniques and procedures (TTPs) of actual threat actors. The red team operates offensively.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Blue team.&lt;/b&gt; The blue team is the internal security team of the organization being tested. Their role is to detect, prevent and respond to the red team's activities, just as they would with a real attack.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Purple team.&lt;/b&gt; This team facilitates collaboration between red and blue teams, ensuring that insights from simulated attacks are effectively communicated and used to enhance defensive strategies.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Green team.&lt;/b&gt; The green team is responsible for developing and maintaining secure systems and applications. They integrate secure coding practices and conduct regular security reviews to identify and prevent vulnerabilities.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Yellow team.&lt;/b&gt; This team's main responsibility is to focus on &lt;a href="https://www.techtarget.com/searchsecurity/definition/social-engineering"&gt;social engineering&lt;/a&gt; tactics, testing the organization's susceptibility to phishing and other manipulation techniques.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;White team.&lt;/b&gt; The white team oversees the entire penetration testing process, ensuring that ethical guidelines are followed, and that testing aligns with legal and organizational policies.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="What are the types of penetration testing?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the types of penetration testing?&lt;/h2&gt;
 &lt;p&gt;There are various types of pen testing strategies, each offering pen testers a certain level of information they need to carry out their attack.&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;White box testing. &lt;/b&gt;White box testing provides testers with all the details about an organization's system or target network and checks the code and internal structure of the product being tested. &lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/white-box"&gt;White box testing&lt;/a&gt; is also known as open glass, clear box, transparent or code-based testing.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Black box testing&lt;/b&gt;. This is a type of behavioral and functional testing where testers aren't given any knowledge of the system. Organizations typically hire ethical hackers for &lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/black-box"&gt;black box testing&lt;/a&gt; where a real-world attack is carried out to get an idea of the system's vulnerabilities.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Gray box testing. &lt;/b&gt;Gray box testing&lt;b&gt; &lt;/b&gt;is a combination of white box and black box testing techniques. It provides testers with partial knowledge of the system, such as low-level credentials, logical flow charts and network maps. The main idea behind gray box testing is to find potential code and functionality issues.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Targeted testing. &lt;/b&gt;This type of testing is&lt;b&gt; &lt;/b&gt;a collaborative effort between an organization's IT staff and external testers, who share an understanding of the testing's scope, objectives and timeline to enable real-time communication and immediate feedback. The main goal is to simulate realistic attack scenarios on critical systems, such as web applications, databases or internal networks to identify vulnerabilities that could be exploited by malicious actors.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Web application testing. &lt;/b&gt;This testing is conducted to find security weaknesses in web-based applications. This involves testing the application's endpoints, databases, source code and backend network. The main objective is to identify run-time vulnerabilities and check for &lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/SQL-injection"&gt;SQL injections&lt;/a&gt;, cross-site scripting (&lt;a href="https://www.techtarget.com/searchsecurity/definition/cross-site-scripting"&gt;XSS&lt;/a&gt;) and authentication issues.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Insider threat testing.&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchsecurity/definition/insider-threat"&gt;Insider threat&lt;/a&gt; testing focuses on simulating attacks originating from within an organization. Unlike external threats, these attacks are carried out by individuals who have authorized access to the organization's systems, such as employees, contractors or business partners. The primary goal is to identify vulnerabilities that could be exploited by insiders, whether maliciously or unintentionally.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Wireless testing.&lt;/b&gt; This type of testing is used to assess the security of &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/Wi-Fi"&gt;Wi-Fi&lt;/a&gt; networks and wireless protocols and the devices connected to them. This test examines the encryption methods, access controls and network configurations to identify weaknesses that could be exploited by unauthorized users.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Internet of things testing. &lt;/b&gt;&lt;a href="https://www.techtarget.com/iotagenda/tip/An-introduction-to-IoT-penetration-testing"&gt;IoT testing&lt;/a&gt; is conducted to examine the security of IoT devices and networks, including vulnerabilities in devices, protocols and data transmission.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cloud testing. &lt;/b&gt;&lt;a href="https://www.techtarget.com/searchstorage/definition/cloud-testing"&gt;Cloud testing&lt;/a&gt;&lt;b&gt; &lt;/b&gt;evaluates the security of cloud-based infrastructure and services, including infrastructure-as-a-service (&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Infrastructure-as-a-Service-IaaS"&gt;IaaS&lt;/a&gt;), platform-as-a-service (&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Platform-as-a-Service-PaaS"&gt;PaaS&lt;/a&gt;) and software-as-a-service (&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Software-as-a-Service"&gt;SaaS&lt;/a&gt;) options. Testers evaluate the configuration settings, access controls and data encryption mechanisms used within cloud environments to identify vulnerabilities and misconfigurations.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Physical testing. &lt;/b&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/Physical-pen-testing-methods-and-tools"&gt;Physical pen testing&lt;/a&gt;&lt;b&gt; &lt;/b&gt;is done to simulate real-world threats by attempting to bypass physical security controls, such as locks, alarms and security cameras, to gain unauthorized access to facilities or systems.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;API testing. &lt;/b&gt;&lt;a href="https://www.techtarget.com/searchapparchitecture/definition/API-testing"&gt;API testing&lt;/a&gt;&lt;b&gt; &lt;/b&gt;focuses on testing the security of APIs, which are crucial for modern application communication. It typically includes identifying vulnerabilities in authentication, authorization and data handling.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Mobile testing. &lt;/b&gt;A mobile application penetration test is a security assessment specifically focused on identifying vulnerabilities in mobile applications, such as those on Android and iOS and their related backend systems and APIs. It simulates real-world attacks to uncover weaknesses in the app's design, implementation and infrastructure that malicious actors could exploit.&lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="What are the stages of pen testing?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the stages of pen testing?&lt;/h2&gt;
 &lt;p&gt;Pen testing can be divided into the following six stages:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;1.&lt;/b&gt; &lt;b&gt;Reconnaissance and planning.&lt;/b&gt; Testers gather all the information related to the target system from public and private sources. Sources might include incognito searches, social engineering, domain registration information retrieval and nonintrusive &lt;a href="https://www.techtarget.com/searchnetworking/definition/network-scanning"&gt;network and vulnerability scanning&lt;/a&gt;. The information is vital for the testers, as it provides clues into the target system's attack surface and open vulnerabilities, such as network components, operating system details, open ports and access points.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;2.&lt;/b&gt; &lt;b&gt;Scanning.&lt;/b&gt; Based on the results of the initial phase, testers might use various scanning tools to further explore the system and its weaknesses. Pen testing tools -- including war dialers, &lt;a href="https://www.techtarget.com/searchsecurity/answer/What-is-a-port-scan-attack"&gt;port scanners&lt;/a&gt;, security vulnerability scanners and network mappers -- are used to detect as many vulnerabilities and loopholes as possible. The vulnerabilities are then shortlisted for exploitation.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;3.&lt;/b&gt; &lt;b&gt;Obtaining entry.&lt;/b&gt; During this stage, testers exploit vulnerabilities assessed in the previous phase by making a connection with the target. The testers conduct common web application security attacks -- including a DoS attack, SQL injections and backdoors, session hijacking and XSS -- to expose the system's vulnerabilities, which are then &lt;a href="https://www.techtarget.com/searchsecurity/feature/Why-companies-should-focus-on-preventing-privilege-escalation"&gt;exploited through privilege escalations&lt;/a&gt;, traffic interception or data stealing techniques.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;4.&lt;/b&gt; &lt;b&gt;Maintaining access.&lt;/b&gt; This stage ensures that the penetration testers stay connected to the target for as long as possible and exploit the vulnerabilities for maximum data infiltration. This stage imitates an &lt;a href="https://www.techtarget.com/searchsecurity/definition/advanced-persistent-threat-APT"&gt;advanced persistent threat&lt;/a&gt;, which can stay active in a system for prolonged periods to steal sensitive data and cause further damage.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;5. Analysis.&lt;/b&gt; The testers analyze the results gathered from the penetration testing and builds them into a report. The report details each step taken during the testing process, including the following:&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;The vulnerabilities the testers exploited.&lt;/li&gt; 
  &lt;li&gt;The type of sensitive data the testers accessed.&lt;/li&gt; 
  &lt;li&gt;The amount of time the testers stayed connected to the target.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;6. Cleanup and remediation.&lt;/b&gt; Once the testing is complete, the pen testers should remove all traces of tools and processes used during the previous stages to prevent a real-world threat actor from using them as an anchor for system infiltration. During this stage, organizations should start remediating any issues found in their security controls and infrastructure.&lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="How often should pen tests be performed?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How often should pen tests be performed?&lt;/h2&gt;
 &lt;p&gt;How frequently pen testing should be conducted depends on many factors, but most security experts recommend doing it &lt;a target="_blank" href="https://static.fortra.com/core-security/pdfs/guides/fta-cs-2024-pen-testing-report-gd.pdf" rel="noopener"&gt;at least once a year&lt;/a&gt;, as it can detect emerging vulnerabilities, such as &lt;a href="https://www.techtarget.com/searchsecurity/definition/zero-day-vulnerability"&gt;zero-day threats&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Organizations should consider the following factors when scheduling pen testing:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Company size.&lt;/b&gt; Larger organizations can suffer greater monetary and reputational losses if they fall prey to cyberattacks. Therefore, they should invest in regular security testing to prevent these attacks.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Budget.&lt;/b&gt; Pen testing should be based on a company's budget and how flexible it is. For example, a larger organization might be able to conduct annual pen tests, whereas a smaller business might only be able to afford them once every two years.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Regulations.&lt;/b&gt; Depending on the industry and regulations, certain organizations are required to conduct mandatory penetration testing. Examples include banking and healthcare organizations.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Scope and objectives.&lt;/b&gt; Organizations should ensure that the systems, applications and data that are being tested are within the scope of the pen test. This could include internal networks, web applications, cloud services or specific databases.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Risk tolerance.&lt;/b&gt; Companies should identify the acceptable level of risk for the organization, which will influence the scope and intensity of the test.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;In addition to regularly scheduled penetration testing, organizations should also conduct security tests when the following events occur:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;New network infrastructure or appliances are added to the network.&lt;/li&gt; 
  &lt;li&gt;Upgrades are performed on existing applications and equipment.&lt;/li&gt; 
  &lt;li&gt;Patches are installed for security.&lt;/li&gt; 
  &lt;li&gt;New office locations are established.&lt;/li&gt; 
  &lt;li&gt;End-user policies have been modified.&lt;/li&gt; 
  &lt;li&gt;Integrations are made with third-party services.&lt;/li&gt; 
  &lt;li&gt;A merger or an acquisition happens.&lt;/li&gt; 
  &lt;li&gt;After major cybersecurity events such as ransomware attacks.&lt;/li&gt; 
  &lt;li&gt;New and emerging technologies are adopted.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="How to perform a penetration test"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to perform a penetration test&lt;/h2&gt;
 &lt;p&gt;Pen testing is unique from other cybersecurity evaluation methods, as it can be adapted to any industry or organization. Depending on its infrastructure and operations, an organization might want to use a certain set of hacking techniques or tools. These techniques and their methodologies can also vary based on the IT personnel and their company standards. Using the following adaptable six-step process, pen testing creates a set of results that can help organizations proactively update their security protocols:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Preparation.&lt;/b&gt; Depending on the organization's needs, this step can either be simple or elaborate. If the organization hasn't decided which vulnerabilities it wants to evaluate, a significant amount of time and resources should be devoted to combing the system for possible entry points. These in-depth processes are usually only necessary for businesses that haven't already conducted a complete audit of their systems. Once a &lt;a href="https://www.computerweekly.com/feature/Vulnerability-assessment-done-Now-What"&gt;vulnerability assessment has been conducted&lt;/a&gt;, however, this step becomes much easier.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Construct an attack plan.&lt;/b&gt; Before hiring ethical hackers, an IT department designs a cyberattack -- or a list of cyberattacks -- that its team should use to perform the pen test. During this step, it's also important to define what level of system access the pen tester has.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Select a team.&lt;/b&gt; The success of a pen test depends on the quality of the testers. This step is often used to appoint the ethical hackers who are best suited to perform the test. Companies can make these decisions based on employee specialties. For example, if a company wants to test its cloud security, a cloud expert might be the best person to evaluate its cybersecurity properly.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Determine the stolen data type.&lt;/b&gt; What is the team of ethical hackers stealing? The data type chosen in this step can have a profound effect on the tools, strategies and techniques used to acquire it.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Perform the test.&lt;/b&gt; This is one of the most complicated and nuanced parts of the testing process, as there are many automated tools and techniques testers can use, including Kali Linux, Nmap, &lt;a href="https://www.techtarget.com/searchsecurity/tip/Using-Metasploit-for-real-world-security-tests"&gt;Metasploit&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchsecurity/tip/Wireshark-tutorial-How-to-sniff-network-traffic"&gt;Wireshark&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Integrate the report results.&lt;/b&gt; Reporting is the most important step of the process. The results the testers provide must be detailed so the organization can incorporate the findings.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/security-pen_testing-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/security-pen_testing-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/security-pen_testing-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/security-pen_testing-f.png 1280w" alt="Diagram showing the steps involved in penetration testing." height="560" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Penetration testing at a glance.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="What happens after a pen test?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What happens after a pen test?&lt;/h2&gt;
 &lt;p&gt;After a pen test is successfully concluded, an ethical hacker shares their findings with the information security team of the target organization. Ethical hackers usually &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-rank-network-security-vulnerabilities-in-your-system"&gt;rank and categorize the findings with a severity rating &lt;/a&gt;so that the issues with the highest rating are given precedence during remediation.&lt;/p&gt;
 &lt;p&gt;The organization uses these findings as a basis for further investigation, assessment and remediation of its security posture. The decision-makers and stakeholders also get involved at this stage and the organization's IT or security team creates deadlines to ensure all security issues are dealt with promptly.&lt;/p&gt;
 &lt;p&gt;After completing remediation efforts, organizations conduct verification testing to ensure fixes effectively address vulnerabilities. They update security documentation and adjust policies as needed, incorporating lessons learned into their strategy. The process concludes with a review meeting for key stakeholders to discuss findings, options and plans for ongoing security improvements to maintain a strong security posture.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="What is the difference between pen testing and vulnerability assessments?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is the difference between pen testing and vulnerability assessments?&lt;/h2&gt;
 &lt;p&gt;Although pen tests aren't the same as &lt;a href="https://www.techtarget.com/searchsecurity/definition/vulnerability-assessment-vulnerability-analysis"&gt;vulnerability assessments&lt;/a&gt;, which provide a prioritized list of security weaknesses and how to amend them, they're often performed together.&lt;/p&gt;
 &lt;p&gt;The main characteristics of pen testing and vulnerability assessments are as follows:&lt;/p&gt;
 &lt;h3&gt;Pen testing&lt;/h3&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Pen testing is more in-depth compared to vulnerability assessments and is often conducted with a particular goal in mind. These goals typically fall under one of the following three objectives: identify hackable systems, attempt to hack a specific system or carry out a data breach.&lt;/li&gt; 
  &lt;li&gt;Each objective focuses on specific outcomes that IT leaders are trying to avoid. For example, if the goal of a pen test is to see &lt;a href="https://www.techtarget.com/searchsecurity/feature/6-data-breach-prevention-strategies-to-defend-against-attack"&gt;how easily a hacker could breach&lt;/a&gt; the company database, the ethical hackers would be instructed to try to carry out a data breach.&lt;/li&gt; 
  &lt;li&gt;The results of a pen test will communicate the strength of an organization's current cybersecurity protocols, as well as present the available hacking methods that can be used to penetrate the organization's systems.&lt;/li&gt; 
  &lt;li&gt;Penetration testing is generally live and manual, making it more accurate.&lt;/li&gt; 
  &lt;li&gt;It takes longer to complete a pen test, typically a day to a few weeks.&lt;/li&gt; 
  &lt;li&gt;Pen testing can be expensive, and the price varies depending on the type of test conducted. According to RSI Security, on average, pen testing costs anywhere from $4,000 to $100,000.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Vulnerability assessments&lt;/h3&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Vulnerability assessments do passive scanning to search for known vulnerabilities in the system and report potential exposures.&lt;/li&gt; 
  &lt;li&gt;Scans are typically automated or scheduled.&lt;/li&gt; 
  &lt;li&gt;Vulnerability assessments can be completed in a few minutes to several hours.&lt;/li&gt; 
  &lt;li&gt;Vulnerability assessments are affordable and depending on the vendor, they can average $1,000 to $5,000 per assessment. Vulnerability assessments sometimes generate false positives.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;i&gt;Discover how penetration testing helps identify security vulnerabilities and learn about the &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/11-open-source-automated-penetration-testing-tools"&gt;&lt;i&gt;top open source tools&lt;/i&gt;&lt;/a&gt;&lt;i&gt; used by ethical hackers for testing network, application and device security controls.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/1.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/definition/penetration-testing</link>
            <pubDate>Wed, 14 May 2025 09:00:00 GMT</pubDate>
            <title>What is penetration testing?</title>
        </item>
        <item>
            <body>&lt;p&gt;The top 10 spyware list describes the most common &lt;u&gt;spyware&lt;/u&gt; threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is spyware?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is spyware?&lt;/h2&gt;
 &lt;p&gt;Spyware refers to &lt;a href="https://www.techtarget.com/searchsecurity/definition/malware"&gt;malicious software&lt;/a&gt; purposely designed to access a computer and record its activity. Spyware can track and record a user's browsing habits, login credentials, passwords and more. The spyware author uses the information obtained in this data breach to engage in fraudulent activity or might sell it to a &lt;a href="https://www.techtarget.com/whatis/definition/third-party"&gt;third party&lt;/a&gt;.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/ZgXw3WCNXc8?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;p&gt;Spyware often spreads through &lt;a href="https://www.techtarget.com/healthtechsecurity/news/366615273/Using-psychology-to-defend-against-phishing-attacks"&gt;phishing&lt;/a&gt; emails, malicious downloads, fake apps or compromised websites. Once installed, it can run in the background logging keystrokes, capturing screenshots or transmitting sensitive data.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/whatis-spyware_types.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/whatis-spyware_types_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/whatis-spyware_types_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/whatis-spyware_types.png 1280w" alt="A chart showing four types of spyware, including adware, keyword loggers, Trojans and mobile spyware." height="282" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Adware, keyword loggers, Trojans and mobile spyware are common forms of spyware.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Visit our &lt;a href="https://www.techtarget.com/searchsecurity/definition/spyware"&gt;spyware&lt;/a&gt; feature page to learn more about this problem and how to beat it.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="The top 10 spyware threats"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The top 10 spyware threats&lt;/h2&gt;
 &lt;p&gt;Some of the top spyware threats organizations face today, according to security experts, include the following:&lt;/p&gt;
 &lt;h3&gt;1. Advanced Keylogger&lt;/h3&gt;
 &lt;p&gt;Advanced Keylogger, a &lt;a href="https://www.techtarget.com/searchsecurity/definition/keylogger"&gt;keystroke logger&lt;/a&gt;, monitors keystrokes and takes screenshots.&lt;/p&gt;
 &lt;h3&gt;2. CoolWebSearch (CWS)&lt;/h3&gt;
 &lt;p&gt;CoolWebSearch (CWS) is a software suite originally used to exploit vulnerabilities in Internet Explorer (&lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Internet-Explorer"&gt;IE&lt;/a&gt;), which Microsoft officially retired in 2022. Though now considered outdated, CWS remains historically significant as one of the earliest, most aggressive examples of browser hijackers. It could rewrite search engine results, redirect &lt;a href="https://www.techtarget.com/searchnetworking/definition/domain-name-system"&gt;DNS&lt;/a&gt; lookups and change browser settings to push users toward ad-laden pages.&lt;/p&gt;
 &lt;h3&gt;3. FinSpy (aka FinFisher)&lt;/h3&gt;
 &lt;p&gt;FinSpy, or FinFisher, is an advanced suite of surveillance tools sold to law enforcement and intelligence agencies. FinSpy works on Windows, macOS, &lt;a href="https://www.techtarget.com/searchdatacenter/definition/Linux-operating-system"&gt;Linux&lt;/a&gt;, &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/Android-OS"&gt;Android&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/iOS"&gt;iOS&lt;/a&gt; operating systems. Its capabilities vary depending on the platform. Law enforcement, intelligence agencies and &lt;a href="https://www.techtarget.com/whatis/definition/threat-actor"&gt;threat actors&lt;/a&gt; often use FinSpy to secretly turn on microphones to record conversations, switch on cameras, record and transmit images, transmit key logs in real time, modify files and more.&lt;/p&gt;
 &lt;h3&gt;4. Gator (GAIN)&lt;/h3&gt;
 &lt;p&gt;Gator is a type of &lt;a href="https://www.techtarget.com/searchsecurity/definition/adware"&gt;adware&lt;/a&gt; that can display banner advertisements based on a user's web surfing habits. Gator is often bundled with numerous free software programs and pirated applications. Gator monitors online user behavior and targets them with &lt;a href="https://www.computerweekly.com/news/366622400/Meta-settles-lawsuit-over-surveillance-business-model"&gt;personalized ads&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;5. GO Keyboard&lt;/h3&gt;
 &lt;p&gt;GO Keyboard was a virtual Android keyboard app that masqueraded as a legitimate &lt;a href="https://www.techtarget.com/whatis/definition/mobile-app"&gt;mobile application&lt;/a&gt;. It was found to transmit personal information to its remote servers without explicit user consent, violating Google Play policies. The app was eventually removed from the Google Play Store, but it serves as a cautionary example of the risks posed by third-party keyboard apps.&lt;/p&gt;
 &lt;p&gt;Information shared by GO Keyboard spyware included the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Android OS version.&lt;/li&gt; 
  &lt;li&gt;Device model and screen size.&lt;/li&gt; 
  &lt;li&gt;Google account email address.&lt;/li&gt; 
  &lt;li&gt;International Mobile Subscriber Identity (&lt;a href="https://www.computerweekly.com/news/252485535/Police-secrecy-over-IMSI-catcher-mass-surveillance-of-mobile-phones"&gt;IMSI&lt;/a&gt;).&lt;/li&gt; 
  &lt;li&gt;Location.&lt;/li&gt; 
  &lt;li&gt;Network type.&lt;/li&gt; 
  &lt;li&gt;Preferred language.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/whatis/definition/social-media"&gt;Social media&lt;/a&gt; interactions.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;GO Keyboard executes code from a remote server to breach &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/Google-Play-Android-Market"&gt;Google Play&lt;/a&gt; privacy policies.&lt;/p&gt;
 &lt;h3&gt;6. HawkEye&lt;/h3&gt;
 &lt;p&gt;HawkEye, a keylogger &lt;a href="https://www.techtarget.com/searchsecurity/definition/virus"&gt;virus&lt;/a&gt;, was dormant for years but resurfaced during the COVID-19 pandemic. It infects machines to track key logs and other inputs, sharing that information with a remote server. New versions are increasingly difficult to detect due to enhanced anti-detection features. One campaign impersonated the World Health Organization in a &lt;a href="https://www.techtarget.com/searchsecurity/definition/social-engineering"&gt;social engineering attack&lt;/a&gt; designed to trick users into downloading a malicious &lt;a href="https://www.techtarget.com/searchsecurity/answer/How-secure-is-an-email-with-a-pdf-attachment"&gt;attachment&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;7. HuntBar&lt;/h3&gt;
 &lt;p&gt;HuntBar is a &lt;a href="https://www.techtarget.com/searchsecurity/definition/Trojan-horse"&gt;Trojan application&lt;/a&gt; that hijacks web browser settings and downloads and installs adware without the user's knowledge. Also known as Adware, Websearch or WinTools, HuntBar tracks browsing behavior, redirects web traffic to affiliate websites, forcefully displays advertisements and installs more spyware programs and toolbars on IE.&lt;/p&gt;
 &lt;h3&gt;8. Look2Me&lt;/h3&gt;
 &lt;p&gt;Look2Me is spyware that tracks user behavior, website logs and social media interactions and shares this information with a remote server. The information is then used to show intrusive advertisements. Look2Me spyware also downloads and installs various &lt;a href="https://www.techtarget.com/whatis/definition/add-on"&gt;add-ons&lt;/a&gt;, &lt;a href="https://www.techtarget.com/whatis/definition/extension"&gt;extensions&lt;/a&gt;, toolbars and other unwanted programs on a user's computer. This makes the spyware threat more dangerous than traditional adware. Removing Look2Me is difficult because of its &lt;a href="https://www.techtarget.com/searchsecurity/definition/rootkit"&gt;rootkit&lt;/a&gt;-type functionality.&lt;/p&gt;
 &lt;h3&gt;9. Pegasus&lt;/h3&gt;
 &lt;p&gt;NSO Group's &lt;a href="https://www.techtarget.com/searchsecurity/definition/Pegasus-malware"&gt;Pegasus spyware&lt;/a&gt; is one of the latest spyware threats making headlines. Although Pegasus was initially developed to fight terrorism, evidence suggests that many clients use Pegasus to spy on journalists, political activists, political opponents and almost anyone the client desires. The governments in France, Hungary, India, Saudi Arabia, United Arab Emirates, the United Kingdom and the United States are known to &lt;a href="https://www.computerweekly.com/news/366614412/Democracy-campaigner-to-sue-Saudi-Arabia-over-Pegasus-and-QuaDream-spyware-in-UK-court"&gt;have used Pegasus spyware&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;10. PhoneSpy&lt;/h3&gt;
 &lt;p&gt;PhoneSpy is an example of a spyware virus that pretends to be a mobile application to gain access to and infect &lt;u&gt;Android&lt;/u&gt; mobile devices. This approach allows threat actors to remotely control mobile devices and steal data. Mobile applications with PhoneSpy aren't available on Google Play Store, so it's believed to spread through social engineering attacks and third-party platforms.&lt;/p&gt;
&lt;/section&gt;                         
&lt;section class="section main-article-chapter" data-menu-title="Emerging mobile spyware threats"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Emerging mobile spyware threats&lt;/h2&gt;
 &lt;p&gt;As mobile device usage continues to rise, threat actors have increasingly turned to smartphones as high-value targets. Here are a few of the most concerning &lt;a href="https://www.techtarget.com/searchmobilecomputing/tip/How-to-prevent-and-remove-mobile-spyware"&gt;mobile spyware&lt;/a&gt; threats discovered in recent years:&lt;/p&gt;
 &lt;h3&gt;Hermit&lt;/h3&gt;
 &lt;p&gt;Hermit is a powerful mobile spyware tool designed to infect both Android and iOS devices. Typically delivered via fake mobile carrier apps or malicious links in &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/Short-Message-Service"&gt;SMS&lt;/a&gt; messages, Hermit can record audio, track location, intercept texts and access contact lists. It has been linked to state-sponsored surveillance campaigns targeting journalists and political figures.&lt;/p&gt;
 &lt;h3&gt;SpyNote&lt;/h3&gt;
 &lt;p&gt;SpyNote is a remote access trojan (&lt;a href="https://www.techtarget.com/searchsecurity/definition/RAT-remote-access-Trojan"&gt;RAT&lt;/a&gt;) that targets Android users. Once installed, it allows attackers to record audio, access text messages and call logs, and even activate the device's camera without user consent. SpyNote is often disguised as a legitimate app and distributed through unofficial app stores or phishing links.&lt;/p&gt;
 &lt;h3&gt;Anatsa (also known as TeaBot)&lt;/h3&gt;
 &lt;p&gt;Anatsa is a banking Trojan with spyware-like capabilities. It has been known to steal login credentials by capturing keystrokes and recording screen activity on Android devices. Anatsa spreads through fake app downloads posing as &lt;a href="https://www.techtarget.com/whatis/definition/QR-code-quick-response-code"&gt;QR code&lt;/a&gt; readers, PDF viewers or security apps.&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="How to protect yourself from spyware"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to protect yourself from spyware&lt;/h2&gt;
 &lt;p&gt;Spyware can be difficult to detect until it's already compromised your device. Here are simple best practices to help reduce the risk of infection:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Use reputable &lt;a href="https://www.techtarget.com/searchsecurity/definition/antivirus-software"&gt;antivirus&lt;/a&gt; and &lt;a href="https://www.techtarget.com/whatis/definition/anti-spyware-software"&gt;antispyware&lt;/a&gt; software and keep it up to date.&lt;/li&gt; 
  &lt;li&gt;Avoid downloading apps or files from untrusted sources, especially third-party websites.&lt;/li&gt; 
  &lt;li&gt;Enable automatic software updates on your devices to patch known vulnerabilities.&lt;/li&gt; 
  &lt;li&gt;Use strong, unique passwords and turn on two-factor authentication (&lt;a href="https://www.techtarget.com/searchsecurity/definition/two-factor-authentication"&gt;2FA&lt;/a&gt;) for sensitive accounts.&lt;/li&gt; 
  &lt;li&gt;Be cautious of phishing emails and attachments, especially those with urgent or alarming messages.&lt;/li&gt; 
  &lt;li&gt;Review app permissions before installing, particularly for mobile apps that request access to contacts, location or cameras.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/security-twofactor_authentication.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/security-twofactor_authentication_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/security-twofactor_authentication_mobile.jpg 960w,https://www.techtarget.com/rms/onlineImages/security-twofactor_authentication.jpg 1280w" alt="A visual describing two-factor authentication." height="708" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Two-factor authentication is a good form of spyware protection.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Staying alert and maintaining good digital hygiene can significantly lower your risk of falling victim to spyware.&lt;/p&gt;
 &lt;h3&gt;FAQs about spyware threats&lt;/h3&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Can spyware infect mobile devices?&lt;/b&gt;&lt;br&gt;Yes. Spyware is increasingly targeting mobile devices through fake apps, malicious links and phishing messages. &lt;a href="https://www.techtarget.com/searchmobilecomputing/tip/Are-iPhones-more-secure-than-Android-devices"&gt;Android devices are especially vulnerable&lt;/a&gt; when apps are downloaded from third-party sources.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;What is the most dangerous spyware in 2025?&lt;br&gt;&lt;/b&gt;Pegasus remains one of the most sophisticated spyware tools in use. However, newer threats like Hermit and Anatsa are also highly capable and dangerous, especially on mobile platforms.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;How do I know if my device has spyware?&lt;/b&gt;&lt;br&gt;Common signs include unexpected battery drain, overheating, slow performance, unknown apps appearing, and unusual network activity. If you suspect spyware, run a trusted mobile security scan and review app permissions.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Is Pegasus spyware still active?&lt;/b&gt;&lt;br&gt;Yes. While originally marketed for counterterrorism, Pegasus has been used by various governments and entities for broader surveillance. It &lt;a href="https://www.computerweekly.com/news/366551655/Polish-election-questioned-after-Pegasus-spyware-used-to-smear-opposition-investigation-finds"&gt;remains a high-profile threat&lt;/a&gt; and continues to evolve.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;&lt;i&gt;Learn more on &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/Check-IT-List-How-to-prevent-spyware"&gt;&lt;i&gt;how to prevent spyware&lt;/i&gt;&lt;/a&gt;&lt;i&gt; through best practices, including using a layered defense or content filtering. See how to &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-protect-against-malware-as-a-service"&gt;&lt;i&gt;protect against malware as a service&lt;/i&gt;&lt;/a&gt;&lt;i&gt;. Also, protecting your endpoints is critical for maintaining security. Learn why &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchsecurity/ehandbook/Why-EDR-technologies-are-essential-for-endpoint-protection"&gt;&lt;i&gt;endpoint detection and response technologies are essential for endpoint protection&lt;/i&gt;&lt;/a&gt;&lt;i&gt;. Explore how to &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchmobilecomputing/tip/How-to-protect-mobile-devices-from-malware-in-the-enterprise"&gt;&lt;i&gt;protect, detect and remove malware from mobile devices&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/3.jpg</image>
            <link>https://www.techtarget.com/whatis/definition/Top-10-Spyware-Threats</link>
            <pubDate>Thu, 08 May 2025 14:35:00 GMT</pubDate>
            <title>What are the top 10 spyware threats?</title>
        </item>
        <title>Search Security Resources and Information from TechTarget</title>
        <ttl>60</ttl>
        <webMaster>webmaster@techtarget.com</webMaster>
    </channel>
</rss>
