Please turn on your JavaScript for this page to function normally.
identity theft
Consumers taking action to protect themselves online, though confidence is low

68% of consumers claim to be doing more to protect themselves from online fraud and identity theft than a year ago, according to a Trulioo research. The research found 76% of …

DDoS
DDoS attacks increased 11% in 1H 2021, fueling a global security crisis

NETSCOUT announced findings from its report that underscore the dramatic impact cyberattacks continue to have on private and public organizations and governments worldwide. In …

ransomware
Ransomware attack levels soaring, now accounting for 69% of all attacks involving malware

Ransomware attacks have reached ‘stratospheric’ levels in Q2 2021, now accounting for 69% of all attacks involving malware. That is among the most disturbing finding in the …

application
SaaS applications investment growing despite underutilization of app licenses by employees

Business investment in SaaS applications continues to climb despite widespread underutilization of app licenses by employees. According to Productiv’s report, on average only …

Laptop
Future of work: Cybersecurity and hybrid working as top two enterprise priorities

The pandemic has changed technology priorities for organizations worldwide finds a report from Omdia on the future of work. The top two enterprise priorities are now …

Mozilla
Creepy data collection and sharing remain common on popular apps

In a recent Mozilla review of the privacy features of 21 popular video call apps, only two were singled out for outstanding features (Signal and Threema). Meanwhile, three …

criminal
How to protect the corporate network from spyware

It used to be easy for network administrators to identify where corporate boundaries are; they were usually where the external and internal networks meet. That made it easy …

healthcare
We cannot afford for healthcare security to be the “lowest-hanging fruit”

Healthcare organizations have never been more essential. Yet when it comes to cybersecurity, too many hospitals, medical groups and research centers lag far behind other …

reload
How digital transformation impacted CIO and CTO roles

Transposit announced results from a recent research study about the evolving roles of the CIO and CTO, as well as the extent of and attitudes towards adoption of DevOps …

email
2 million malicious emails bypassed secure email gateways in 12 months

Two million malicious emails bypassed traditional email defenses, like secure email gateways, between July 2020-July 2021, according to data from Tessian. Who’s being targeted …

cloud money
Whole cloud spending to surpass $1.3 trillion by 2025

Over the past decade, cloud computing has become the foundation for the delivery of mobile and content services as well as an alternative to traditional enterprise computing …

microsoft power apps
Microsoft Power Apps data exposure: Prioritizing sensitive data with secure configuration settings

Security misconfigurations are one of the most common gaps hackers look to exploit. One bad configuration setting in a popular cloud platform can have far-reaching …

Don't miss

Cybersecurity news