Please turn on your JavaScript for this page to function normally.
Business ideas
6 ways your cloud data security policies are slowing innovation – and how to avoid that

As practically every organization shifts from managing their data in network-based data centers to storing it in the cloud, cloud data security policies are created to secure …

chess
How can organizations stay ahead of cybersecurity challenges?

The onslaught of ransomware attacks has catapulted cybersecurity to the forefront of global business operations. However, just 36% of mid-sized organizations still don’t have …

ransomware
A third of organizations experience a ransomware attack once a week

Ransomware attacks show no sign of slowing. According to new research published by Menlo Security, a third of organizations experience a ransomware attack at least once a …

email
Universities are at risk of email-based impersonation attacks

Proofpoint released new research which found that the top universities in the United States, the United Kingdom and Australia are lagging on basic cybersecurity measures, …

cloud
Enterprises face a multitude of barriers to securing diverse cloud environments

60% of IT and security leaders are not confident in their organization’s ability to ensure secure cloud access, even as adoption continues to grow across a diverse range of …

idea
How to minimize your exposure to supply chain attacks

Supply chain attacks are on the rise, and many organizations seem unsure on how to respond to the threat, but I’m here to tell you that there are several steps you can take to …

fake
How to spot deep-faked candidates during interviews

The FBI recently issued a warning that malicious attackers are using deepfakes to apply for a variety of remote work positions via virtual interviews over the internet. These …

biohazard
87% of the ransomware found on the dark web has been delivered via malicious macros

Venafi announced the findings of a dark web investigation into ransomware spread via malicious macros. Conducted in partnership with criminal intelligence provider Forensic …

Privileged Access Management for Dummies
eBook: Privileged Access Management for Dummies

With so many recent high-profile breaches accomplished through the compromise of passwords on privileged accounts, it’s time all cybersecurity stakeholders got educated. This …

cloud
“ParseThru” vulnerability allows unauthorized access to cloud-native applications

A new vulnerability found in GoLang-based applications allows a threat actor to bypass validations under certain conditions and gain unauthorized access to cloud-native …

Fraud losses
Online payment fraud losses accelerate at an alarming rate

Cumulative merchant losses to online payment fraud globally between 2023 and 2027 will exceed $343 billion, according to Juniper Research. As a comparison, this equates to …

AI
How AI and cybersecurity complement each other

As the modern world evolves, more threats arise. Knowledge of cybersecurity and artificial intelligence (AI) has become crucial to a successful business. Businesses everywhere …

Don't miss

Cybersecurity news