Please turn on your JavaScript for this page to function normally.
colors
An organization’s security posture will benefit from increased coordination

NAVEX Global released key findings from its survey of IT security professionals in the U.S. and U.K. on the collaboration between the IT and risk management functions. …

smart cybersecurity spending
SMBs willing to spend more money to protect their data

Cybersecurity remains a top priority for SMBs worldwide, as revealed in a survey conducted by Vanson Bourne. The report found that organizations are challenged to find a MSP …

fraud detection
How to conquer synthetic identity fraud

“No single organization can stop synthetic identity fraud on its own,” reports The Federal Reserve. “Fraudster tactics continually evolve to stay a step ahead of detection—and …

containers
Unstructured data still overshared inside and outside organizations

The number of overshared files rose 450 percent compared to the same quarter in 2020, highlighting the significant impact of the pandemic and remote work on data security. …

lock
Researchers design new techniques to bolster computer security

Because corporations and governments rely on computers and the internet to run everything from the electric grid, healthcare, and water systems, computer security is extremely …

mobile security
Consumers neglecting mobile security despite growing number of threats

Over the past year, consumers have adapted to many changes, including the rapid shift towards a digital-first lifestyle. This has led to an emphasis on consumers dependence on …

ransomware
Navigating the complexity of ransomware negotiations

Most ransomware attacks are opportunistic, and at the end of the day, cybercriminals do not discriminate. Nobody plans to fall victim, but the fact is any company with an …

Google Workspace
A closer look at Google Workspace privacy and data security

Google recently unveiled the next evolution of Google Workspace, including new security and privacy capabilities to help users take advantage of trusted, cloud-native …

USB
USB threats could critically impact business operations

According to a report released by Honeywell, USB threats that can severely impact business operations increased significantly during a disruptive year when the usage of …

certificate
Technical certifications demand growing, most IT employees have at least one

Technical certifications are increasingly in demand with 87% of IT employees possessing at least one and 40% pursuing their next. According to Questionmark, certification …

privacy
Many companies believe it is important to protect employee privacy, yet few are effective in doing so

DTEX Systems released a report which revealed a significant workforce privacy gap. The report, conducted by the Ponemon Institute, surveyed a global pool of 1,249 IT and IT …

data
SMEs strongly positioned in the data protection sector

Small and medium-sized enterprises seem to be strongly positioned in the data protection sector, according to a recent survey of 600 German, French and British executives …

Don't miss

Cybersecurity news