Please turn on your JavaScript for this page to function normally.
DDoS
DDoS attackers stick to their target even if they are unsuccessful

Link11 has released its DDoS report for Q1 2021 which revealed the number of DDoS attacks continued to grow. Between January and March, more than double the number of attacks …

risk
Cybersecurity control failures listed as top emerging risk

Cybersecurity control failures was listed as the top emerging risk in 1Q21 in a global poll of 165 senior executives across function and geography, according to Gartner. …

cloud money
How organizations can optimize cloud spend

Although 80% organizations recognize cloud computing as being vital to their financial security, 57% have encountered unexpected costs, according to a study from Aptum. 80% IT …

laptop
58% of orgs predict remote workers will expose them to data breach risk

35% of UK IT decision makers admitted that their remote workers have already knowingly put corporate data at risk of a breach in the last year according to an annual survey …

Fraud losses
eCommerce fraud losses to surpass $20 billion this year

The value of losses due to eCommerce fraud will rise this year, from $17.5 billion in 2020 to over $20 billion by 2021; a growth of 18% over a single year, according to a …

PCI
PCI SSC publishes PCI Secure Software Standard 1.1 and supporting program documentation

Version 1.1 of the PCI Secure Software Standard introduces the Terminal Software Module, a new security requirements module for payment software intended for deployment and …

week in review
Week in review: QNAP NAS ransomware, threat modeling, the realities of working in cybersecurity

Here’s an overview of some of last week’s most interesting news, articles and interviews: Attackers can teach you to defend your organization against phishing Using the kill …

identity theft
Shedding light on the threat posed by shadow admins

Few organizations would purposefully hand a huge responsibility to a junior staff member before letting them fly solo on their own personal projects, but that’s effectively …

code
APIs in the insurance industry: Accessing a growing world of data

The insurance industry is vast and varied. It can be found in nearly every country in the world, with the earliest references dating back as early as 1750 BC. Modern …

threat modeling
What is threat modeling and why should you care?

While there is not one exact industry wide definition, threat modeling can be summarized as a practice to proactively analyze the cyber security posture of a system or system …

vault
Researchers develop program that helps assess encryption systems’ vulnerabilities

Anastasia Malashina, a doctoral student at HSE University, has proposed a new method to assess vulnerabilities in encryption systems, which is based on a brute-force search of …

eavesdropping
Lack of visibility into IT assets impacting security priorities

Axonius released a report which reveals the extremes to which the pandemic escalated lack of visibility into IT assets and how that is impacting security priorities. According …

Don't miss

Cybersecurity news