cyber risk

Understanding the cloud shared responsibility model
Over the past year, we witnessed a transition to the cloud as companies had to quickly adjust to the almost instantaneous move to a remote work environment. But in many cases, …

Corporate attack surfaces growing concurrently with a dispersed workforce
Zscaler released a report on the state of corporate attack surfaces. Based on data sourced between February 2020 and April 2021, the report provides a first-ever look at the …

Effects of the pandemic on consumer security behaviors
IBM announced the results of a global survey examining consumers’ digital behaviors during the pandemic, as well as their potential long-term impact on cybersecurity. …

Bad cybersecurity behaviors plaguing the remote workforce
A report from Tessian reveals that 56% of IT leaders believe their employees have picked up bad cybersecurity behaviors since working from home. As organizations make plans …

Top threats to consumer cyber safety
Norton Labs revealed the top cybersecurity trends from January to March 2021. Phishing campaigns remained the number one threat to consumer cyber safety, with top scams …

Are your cyber defenses stuck in the sandbox?
Installing a network sandbox to safeguard against external threats has been accepted by many as the gold standard for more than a decade. Sandbox-based cybersecurity solutions …

Digital criminals turn toward vaccines to capitalize on COVID-19
Cybercriminals continue to capitalize on the hysteria and worry caused by COVID-19, both in the physical sphere and digital ecosystem, exploiting the significant global unmet …

DDoS attacks increase 341% amid pandemic
During the pandemic, cyber attackers targeted industries providing connectivity, services and entertainment to populations forced to shelter-in-place, resulting in a 341% …

Mitigating third-party risks with effective cyber risk management
Third-party engagement has steadily become an essential part of business operations for many organizations, enlisted for all kinds of products and services across nearly all …

Organizations leveraging Microsoft Teams exposed to potential risk
A survey conducted by Exec Survey and iGov Survey, reveals how over 200 unique organizations in the U.K. enabled seamless business continuity amid rapid societal change, where …

How can companies prioritize contact center security?
Security is front of mind for a lot of organizations these days, especially due to the 400% increase in cyberattacks since the pandemic started. Notable and alarming attacks …

Most mobile finance apps vulnerable to data breaches
77% of financial apps have at least one serious vulnerability that could lead to a data breach, an Intertrust report reveals. This report comes at a time where finance mobile …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility