The Rise of Cybercrime – An Overview

Cybercrimes are more rampant in the year 2022. The rate of cybercrimes is increasing every year, and it is expected to reach its highest next year. It is said that cybercrime affects the security of more than 80% of businesses throughout the world today. It is mainly due to the limited capabilities of authorities in monitoring cyberattacks because this type of crime is performed using the virtual world.

According to the cybersecurity stats, more than half of cyberattacks are done through ransomware attacks. The statistics further stated that healthcare databases are the most targeted because of their importance to businesses. In addition, social media websites are also abused to spread malware and viruses or compromise sensitive information.

Ransomware as a Service: The Trending Business Model for Attacks

Ransomware as a Service (RaaS) is the new and trending business model for ransomware attacks. It’s a decentralized and mostly automated mode of distribution to support the fast-growing demands of ransomware operators.

Currently, the attackers behind ransomware campaigns are constantly looking for ways to maximize profit (and minimize the effort). The RaaS framework can be used by anyone, even without any coding skills, as it provides essential tools to implement encryption and communication with command-and-control servers quickly.

Apache Kafka in the Public Sector – Part 5: National Security and Defense

The public sector includes many different areas. Some groups leverage cutting-edge technology, like military leverage. Others like the public administration are years or even decades behind. This blog series explores how the public sector leverages data in motion powered by Apache Kafka to add value for innovative new applications and modernizing legacy IT infrastructures. This is part 5: Use cases and architectures for national security, cybersecurity, defense, and military.

Blog series: Apache Kafka in the Public Sector and Government

This blog series explores why many governments and public infrastructure sectors leverage event streaming for various use cases. Learn about real-world deployments and different architectures for Kafka in the public sector:

Apache Kafka in the Public Sector — Part 4: Energy and Utilities

The public sector includes many different areas. Some groups leverage cutting-edge technology, like military leverage. Others like the public administration are years or even decades behind. This blog series explores how the public sector leverages data in motion powered by Apache Kafka to add value for innovative new applications and modernize legacy IT infrastructures. This is part 4: Use cases and architectures for energy, utilities, and smart grid infrastructure.

Blog series: Apache Kafka in the Public Sector and Government

This blog series explores why many governments and public infrastructure sectors leverage event streaming for various use cases. Learn about real-world deployments and different architectures for Kafka in the public sector:

Using Cloud to Live Test Malware Defenses

In this report, The State of Ransomware in 2020, research suggests that every eleven seconds, some business is being attacked by a cybercriminal. The frequency of attacks is up year over a year along with the diversity of business types being attacked. In the same report, you can see details of various organizations being attacked.

Couple this with Cybersecurity Talent Crunch to Create 350 Million Unfilled Jobs Globally by 2021, and it is apparent that many companies will have to rely on existing worker talent to combat an ever-increasing threat. Of course, high-tech companies have high-tech talent, but what about all the other types of organizations like government, education, service industry, and manufacturing. We all like to think we have skilled workers regardless of our industry. Still, under this new growing threat, our current in-house cybersecurity skills might not be at the level needed to provide maximum safeguard.

The New Cyber Protection Space = Data Protection + Cybersecurity

What Is Cyber Protection?

Cyber Protection is an IT industry solution category that merges the existing spaces of data protection and cybersecurity, with an objective of securing the safety and resiliency of application and business data, whether in flight or in storage, across hybrid cloud and distributed device environments against a globally connected attack surface.

Dev and Ops. Containers and Cloud Computing

Some things just go great together. We’re on the cusp of another great combination, as the tectonic forces of market dynamics and modern threats are fusing together two well-established information technology sectors: data protection and cybersecurity -- into a bigger, broader category of solutions for Cyber Protection.

Changes in Cybersecurity (Part 1)

We're excited to announce Trend Reports by DZone beginning with Application Security! Everyone involved in building applications — from developers to CTOs — should think about security ramifications. This Trend Report will explore what developers feel are the most prominent threats, where corporate priorities lie, and how secure coding practices are being implemented. Keep an eye on your inbox and our homepage on July 22nd to learn more."

To understand the current and future state of the cybersecurity landscape, we spoke to, and received written responses from, 50 security professionals. We asked them, "How do you see the cybersecurity landscape changing?"