Please turn on your JavaScript for this page to function normally.
Hand
Insights into end-user security awareness and behavior around phishing

Phishing remains a leading concern for organizations worldwide. A new Proofpoint report features analysis of data related to nearly 130 million cybersecurity questions and …

IoT
Global IoT market projected to reach $1111.3 billion by 2026

Organizations around the world are increasingly adopting advanced technologies, which is driving the global Internet of Things (IoT) market. Fortune Business Insights in a …

lightbulb
69% of organizations believe they can’t respond to critical threats without AI

Businesses are increasing the pace of investment in AI systems to defend against the next generation of cyberattacks, a study from the Capgemini Research Institute has found. …

vault
The highly competitive global encryption management solutions market continues to grow

The increasing adoption of digitalization and globalization of enterprises have made IT resources prone to cyber attacks. This has increased the demand for encryption …

fire
More than 2 million cyber incidents in 2018 created $45 billion in losses

The financial impact of ransomware rose by 60%, losses from business email compromise (BEC) doubled, and cryptojacking incidents more than tripled, all despite the fact that …

cloud
Prioritizing security efforts is key to data security in the cloud

32% of healthcare organizations store a wide range of sensitive data in the cloud, including healthcare data and personally identifiable information (PII) of customers and …

mobile apps
How mobile use cases in financial services are affecting security

Financial services organizations are increasingly exposed to cyber threats, according to Wandera. The report “​Mobile Security in the Financial Services​,” includes analysis …

brain
How consumers view the transparency of their AI-enabled interactions

The ethical use of AI is becoming fundamental to winning people’s trust, a new study from the Capgemini Research Institute has found. As organizations progress to harness the …

magnify
Discovering and fingerprinting BACnet devices

BACnet is a communication protocol deployed for building automation and control networks. The most widely accepted networks include Internet Protocol (BACnet/IP) and the …

dual monitors
The pervasive use of second screens endangers corporate IT networks

Despite techies having argued for years that having a second computer screen is a great way to improve productivity in the workplace, a new study from Gigamon has revealed …

cloud complexity
Do cloud apps make you a target for cyber attacks?

Almost half (49%) of businesses believe cloud apps make them a target for cyber attacks, a Thales research reveals. Surveying 1,050 IT decision makers globally, Thales’ 2019 …

data
Scientists developing self-organizing migration of services with sovereignty over proprietary data

Developing a self-organizing migration of services is the core idea of the team headed by Magdeburg project leader, Professor Dr. Mesut Güne. This means that the services …

Don't miss

Cybersecurity news