cyber resilience

Massive complexity endangers enterprise endpoint environments
There’s a massive amount of complexity plaguing today’s enterprise endpoint environments. The number of agents piling up on enterprise endpoint devices – up on average – …

Cyber readiness has improved, but potential blind spots remain
Businesses are enhancing levels of spending and activity to minimize their vulnerability to cyber incidents and breaches, according to Hiscox. The annual Hiscox Cyber …

The smaller the business, the smaller the focus on cybersecurity
With 89% of small businesses moving to a remote workforce, there remains a significant gap between the perceived importance of cybersecurity protections for businesses with …

Three years after WannaCry, what have we learned?
Three years ago, the WannaCry ransomware worm wreaked havoc on hundreds of thousands of organizations worldwide, ranging from hospitals that had to pause urgent operations to …

How prepared are SMBs to recover from disaster?
The vast majority of SMBs both expect the unexpected and feel that they’re ready for disaster – though they may not be, Infrascale reveals. Ninety-two percent of SMB …

The link between a robust IT infrastructure and business continuity
The pandemic has irrevocably changed the way businesses everywhere operate, crystallizing the link between a robust IT infrastructure and business continuity. According to a …

What do IGA solutions have in common with listening to music anywhere?
Fifteen years ago, there was a revolution in personal music players. The market had slowly evolved from the Walkman to the Discman, when a bolt of innovation brought the MP3 …

Only 36% of critical infrastructures have a high level of cyber resilience
Greenbone Networks revealed the findings of a research assessing critical infrastructure providers’ ability to operate during or in the wake of a cyberattack. The cyber …

Mental Health Awareness Week: Coping with cybersecurity pressures amidst a global pandemic
As most of the UK’s cybersecurity workforce now sits at home isolated while carrying out an already pressurised job, there is every possibility that this could be affecting …

64% of workers say their quality of work has improved amid pandemic disruption
64 percent of workers in the U.S. say their quality of work has improved amid the disruptive impact of COVID-19, according to KPMG. They also reported better collaboration (70 …

Three firmware blind spots impacting security
Built into virtually every hardware device, firmware is lower-level software that is programmed to ensure that hardware functions properly. As software security has been …

What is the impact of AI and ML tools on cybersecurity?
89% of IT professionals believe their company could be doing more to defend against cyberattacks, with 64% admitting they are not sure what AI/ML means – despite increased …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility