Please turn on your JavaScript for this page to function normally.
vault
The highly competitive global encryption management solutions market continues to grow

The increasing adoption of digitalization and globalization of enterprises have made IT resources prone to cyber attacks. This has increased the demand for encryption …

cloud complexity
Do cloud apps make you a target for cyber attacks?

Almost half (49%) of businesses believe cloud apps make them a target for cyber attacks, a Thales research reveals. Surveying 1,050 IT decision makers globally, Thales’ 2019 …

Windows
Most SMB devices run Windows versions that are expired or will expire by January 2020

There is a steady increase in attacks and changes in attack methods that target weaknesses in encryption, workload configuration, limited visibility into vulnerabilities and …

Face
Insider attacks still far more difficult to detect and prevent than external cyber attacks

A recent survey conducted by Gurucul of more than 320 IT security experts, found that 15 percent of people said they would delete files or change passwords upon exiting a …

city
Interoperability and security remain critical factors in any smart city deployment

Smart cities are expected to be commonplace within the next 10 years, according to a new poll by Wi-SUN Alliance. Over half of respondents expect to see widespread smart city …

hand
Threat actors are doing their homework, researchers identify new impersonation techniques

There is an increase in three main areas: spoofed phishing attempts, HTTPS encryption in URL-based attacks, and cloud-based attacks focused on publicly hosted, trusted …

dotcom
Every year, millions of web domains are registered to defraud businesses

The growth of fraudulent domains corresponds to the growth of the overall domain landscape, according to Proofpoint. Between Q1 and Q4 2018, registrations of fraudulent …

law enforcement
Eurofins ransomware attack affected UK police work

Eurofins, a global provider of scientific testing services, said on Monday that operations are returning to normal after the recent ransomware attack, but that its impact on …

find
Why poor visibility is hampering cybersecurity

Enterprises are challenged with security basics, according to Panaseer’s first Security Leader’s Peer Report. Data from an external survey of 200 enterprise …

Botnets shift from Windows towards Linux and IoT platforms

Botnets in 2018 continued to use DDoS as their primary weapon to attack high-speed networks, according to NSFOCUS. Continuous monitoring and research of botnets discovered …

industrial
Organizations are advancing their efforts, investing in OT cybersecurity programs

ICS cybersecurity threats remain high and present evolving challenges, a new SANS report reveals. However, since the last SANS OT/ICS report released in 2017, a growing …

gamer
The gaming community is a rising target for credential stuffing attacks

Hackers have targeted the gaming industry by carrying out 12 billion credential stuffing attacks against gaming websites within the 17-month period analyzed in the report …

Don't miss

Cybersecurity news