Please turn on your JavaScript for this page to function normally.
SIEM
Traditional SIEM platforms no longer meet the needs of security practitioners

Panther Labs released the findings from their report which surveyed over 400 security professionals who actively use a SIEM platform as part of their job, including CISOs, …

user
3 ways to protect yourself from cyberattacks in the midst of an IT security skill shortage

With COVID-19 variants on the rise, widespread remote work may be sticking around longer than IT leaders would like, which comes with a heightened risk for cyberattacks that …

Baha Zeidan
Healthcare cybersecurity under attack: How the pandemic affected rural hospitals

Ever since it started, the pandemic has greatly affected the overall threat landscape, with different organizations falling victims to cyberattacks. Understandably, those who …

insider threat
Enterprises are missing the warning signs of insider threats

Organizations struggle to identify the warning signs of insider threats, according to a report by the Ponemon Institute. The report surveyed a global pool of 1,249 IT and IT …

ransomware
Ransomware attacks increased by 288% in H1 2021

Analysis from NCC Group’s Research Intelligence and Fusion Team (RIFT) has highlighted the growing threat of ransomware around the world. The number of ransomware attacks …

mobile security
Consumers satisfied with mobile security, yet account privacy and protection concerns remain

More than half of wireless subscribers polled were extremely or somewhat satisfied with the security offered by their mobile operators, according to a mobile security survey …

face
Previous employees with access to corporate data remain a threat to businesses

Offboarding employees securely is a key problem for business leaders, with 40% concerned that employees who leave a company retain knowledge of passwords that grant access to …

industrial
The cybersecurity of industrial companies remains low, potential damage can be severe

Positive Technologies released a research that examines information security risks present in industrial companies, the second-most targeted sector by cybercriminals in 2020. …

tools
Finding and using the right cybersecurity incident response tools

Unpacking the layers of a cyberattack is rarely a simple task. You need to analyze many potential entry points, attack paths, and data exfiltration tactics to reveal the scope …

White House
The cybersecurity metrics required to make Biden’s Executive Order impactful

For too long, both the private and public sectors have not prioritized cybersecurity efforts enough and only acted in “good faith” – an inadequate effort to improve …

attacks
Increase in credential phishing and brute force attacks causing financial and reputational damage

Abnormal Security released a report which examines the escalating adverse impact of socially-engineered and never-seen-before email attacks, and other advanced email …

mobile apps
Debunking myths about consumer expectations around mobile apps security

Appdome has released a global consumer survey which provides comprehensive insight into the complex and sophisticated security, malware and threat-defense expectations of …

Don't miss

Cybersecurity news