Please turn on your JavaScript for this page to function normally.
biohazard
The nastiest ransomware, phishing and botnets of 2019

Webroot released its annual Nastiest Malware list, shedding light on 2019’s worst cybersecurity threats. From ransomware strains and cryptomining campaigns that delivered the …

gap
Majority of 2019 breaches were the result of unapplied security patches

Despite a 24% average increase in annual spending on prevention, detection and remediation in 2019 compared with 2018, patching is delayed an average of 12 days due to data …

Search
Examining security process maturity in 400 organizations

There’s an overall failure in maturity of security processes of over 400 organizations in industries ranging from e-commerce, retail and payment processor to …

money
Global DX tech investments to total $7.4 trillion over the next four years

Worldwide spending on the technologies and services that enable the digital transformation (DX) of business practices, products, and organizations is forecast to reach $2.3 …

shark
Is the enterprise on the brink of a global web supply chain attack?

Ever since the Web development ecosystem evolved to the current paradigm of code reuse, companies have placed themselves too close to the abyss. Web supply chain attacks are a …

bomb
Companies unprepared to deal with mobile attacks, synthetic identity fraud, CCPA compliance

There is a growing impact of large-scale data breaches and fraud on consumer trust and the critical need for businesses to balance the digital consumer experience with strong …

search
Investigations are an unfortunate fact of life for most corporations

Corporate investigations, which can be triggered by any number of events, have become a fact of life for most companies, according to a survey from H5. The survey focused on …

5G
Most decision makers expect AI and 5G to impact their cybersecurity strategy

An overwhelming majority of cybersecurity and risk management leaders believe that developments in 5G wireless technology will create cybersecurity challenges for their …

fire
DevOps firewall: How pre-configuring your cloud deployment can ensure compliance

Following the recent massive Capital One data breach, it’s clear that even some of the world’s largest and most respected companies working in the cloud are still vulnerable …

wireless
New protocol extends Wi-Fi range, can be used with existing hardware

A protocol that significantly extends the distance a Wi-Fi-enabled device can send and receive signals has been created by a group of researchers led by a Brigham Young …

cloud
IaaS cloud vulnerabilities expected to increase 50% over 2018 figures

Although the total number of IaaS cloud vulnerabilities is still small and the technology relatively young, volumes are increasing year-over-year at a steady rate, an expected …

IoT
Integrating security into IoT projects is not easy, but it’s increasingly urgent

With an installed base of 44 billion connected devices projected for 2023, the amount of data and information generated and shared will reach zettabytes of data, according to …

Don't miss

Cybersecurity news