cybersecurity
Vaccinate your data: Addressing and adapting to new data risks
It seems like only yesterday that we were all reading up on what the implementation of the European Union’s General Data Protection Regulation (GDPR) would mean for businesses …
Protect your smartphone from radio-based attacks
By now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone …
Half of organizations are ineffective at countering phishing and ransomware threats
Half of US organizations are not effective at countering phishing and ransomware threats, Osterman Research research reveals. The findings come from a study compiled from …
How to balance employee IT security policies
Hysolate announced the release of its latest enterprise security study exploring 200 enterprise IT and security leaders’ views on enterprise priorities for ensuring secure …
Application security tools ineffective against new and growing threats
A study by Fastly and ESG, based on insights from information security and IT professionals representing hundreds of organizations globally, revealed growing concerns around …
Worldwide AIOps market size to grow steadily by 2027
The global AIOps market size is projected to reach $23.9 billion by 2027, from $4.0 billion in 2020, at a CAGR of 30% during 2021-2027, according to Valuates Reports. Major …
Physical threats increase as employees return to the office
As COVID-19 vaccinations continue, companies embrace hybrid work, employees return to the office and the U.S. opens up, violence and physical threats to businesses are …
57% of reported incidents are caused by insiders
Insider data breaches were the top cause of data and cybersecurity incidents reported in the first quarter of 2021, according to the ICO. 57% of reported incidents were caused …
22% of exploits for sale in underground forums are more than three years old
Trend Micro released a research urging organizations to focus patching efforts on the vulnerabilities that pose the greatest risk to their organization, even if they are years …
What’s next on the agenda for Chief Compliance Officers?
As demands on the compliance function grow more intense, Chief Compliance Officers (CCOs) must proactively embrace new leadership responsibilities for their role and …
Multi-cloud environments creating additional security challenges
Tripwire announced the results of a research report that evaluated cloud security practices across enterprise environments in 2021. Conducted by Dimensional Research, the …
Cybercriminals customizing malware for attacks on virtual infrastructure
Cyber incidents continue to rise, ransomware accounts for nearly two-thirds of all malware attacks, and more cybercriminals are customizing malware for attacks on virtual …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality