Please turn on your JavaScript for this page to function normally.
industry
Three OT security lessons learned from 2021’s biggest cyber incidents

What do an oil pipeline, a water treatment plant, and a railway system have in common? They each rely on operational technology (OT) environments, and they were all victims of …

application
Employers must balance productivity and collaboration tools with security

Americans are more concerned about cybersecurity than ever before, according to Unisys. The survey found that concerns around internet security (including computer viruses and …

hands
Despite large investments in security tools, organizations are not confident they can stop data exfiltration

An Osterman Research survey of 255 cybersecurity professionals (CIOs, IT managers, CISOs and security managers), exploring attitudes and perceptions surrounding data …

Alexander Garcia-Tobar
Implementing DMARC to eliminate phishing emails

In this interview with Help Net Security, Alexander Garcia-Tobar, CEO at Valimail, explains the importance of implementing DMARC, as email is still greatly used by …

skull binary
API attacks are both underdetected and underreported

Akamai released a research into the evolving threat landscape for application programming interfaces (APIs), which according to Gartner will be the most frequent online attack …

flame
Despite increased cyber threats, many organizations have no defense plans in place

98% of U.S. executives report that their organizations experienced at least one cyber event in the past year, compared to a slightly lower rate of 84% in non-U.S. executives, …

cybersecurity investments
Increased risk tolerances are making digital transformation programs vulnerable

Digital transformation programs could be vulnerable to cyber attacks due to increased risk tolerances and ongoing cybersecurity challenges, according to a global research of …

DNS
72% of organizations hit by DNS attacks in the past year

Domain name system (DNS) attacks are impacting organizations at worrisome rates. According to a survey from the Neustar International Security Council (NISC) conducted in …

ransomware
Ransomware: How bad is it going to get?

Ransomware started out with attackers encrypting individual users’ files, demanding a few hundred dollars, and giving the victim a key to unlock their files once they paid up. …

bot protection
Despite spending millions on bot mitigation, 64% of organizations lost revenue due to bot attacks

A Kasada survey covers the state of bot mitigation exclusively from the perspective of organizations already using anti-bot solutions. The state of bot mitigation 64% of …

MITRE ATT&CK
Released: MITRE ATT&CK v10

MITRE Corporation has released the tenth version of ATT&CK, its globally accessible (and free!) knowledge base of cyber adversary tactics and techniques based on …

shield
CDR: The secret cybersecurity ingredient used by defense and intelligence agencies

It’s very rare that the defense and intelligence community is vulnerable to file-based attacks. After all, for these organizations security is not a business case, it’s a case …

Don't miss

Cybersecurity news