cybersecurity
Organizations increasingly reluctant to pay ransomware demands
To better understand concerns about recent ransomware attacks, Menlo Security conducted a global poll on responses and reactions to ransomware. attacks. Organizations hit by …
How mobile operators view security in the 5G era
There’s a major gap in security capability among mobile operators, which in many cases is not yet being filled by industry partnerships, Trend Micro reveals. In the 5G …
Most enterprises started a modernization program due to the pandemic
Advanced released a report which examines the current mainframe market, the associated challenges facing large enterprises worldwide, and the impact COVID-19 has and will …
Decision makers divided about cloud technology adoption
As businesses seek technology solutions that help us prepare for a new post-pandemic normal, cloud adoption rates continue to rise. In fact, according to research, 67% of all …
Resilience by design: What security pros need to know about microlearning
It’s no secret that security training is failing us. Research has revealed that more 90% of people struggle to identify a phishing email — arguably one of the most basic …
Protecting your organizations against BEC and other email attacks
No matter who you talk to or work with, they probably use email as a primary means of communication. Most of us spend about 5 hours a day checking email, sometimes refreshing …
Industrial facilities progressively at risk of data theft and ransomware attacks
Trend Micro released a new report highlighting the growing risk of downtime and sensitive data theft from ransomware attacks aimed at industrial facilities. “Industrial …
Secure AI is the foundation of trustworthy AI
AI-based recommendation systems are used in many online services we enjoy today, including search engines, online shopping sites, streaming services, and social media. …
XDR: Security’s new frontier
As enterprises transform their IT environment and workforce, finding the right security approach is critical for success. Without the proper protective measures in place, …
Threat modeling needs a reset
Organizations need to rethink their approach to threat modeling or risk losing its value as a key defense in their cybersecurity arsenals. The traditional approaches to threat …
Chief Compliance Officers must embrace new leadership responsibilities
As demands on the compliance function grow more intense, Chief Compliance Officers (CCOs) must proactively embrace new leadership responsibilities for their role and …
Major threats to cloud infrastructure security include a lack of visibility and inadequate IAM
98% of companies had experienced at least one cloud data breach in the past 18 months compared to 79% last year, according to an IDC survey. Meanwhile, 67% reported three or …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality