cybersecurity
Understanding and stopping 5 popular cybersecurity exploitation techniques
With more than 550,000 new malware samples being discovered every day, closing the security gaps that enable these cyberthreats to access systems should be a priority for …
Paving the way for women in industrial cybersecurity research
The professional journey an individual takes is heavily influenced by the people they are surrounded with throughout their life. From an early age, I knew I wanted to study …
79% of organizations identify threat modeling as a top priority in 2021
Security Compass published the results of a report designed to provide a better understanding of the current state of threat modeling in mid-sized, $100M to $999M and large …
Health insurers facing growing risk of customer data theft
The U.S. health insurance industry is facing growing risks from cybersecurity threats due to the increasingly sophisticated techniques used by cybercriminals amid the …
IT, healthcare and manufacturing top targets for cyberattacks
Avanan announced the release of a report which analyzes today’s threat landscape, phishing vectors, and industry-based attacks, exposing healthcare and manufacturing as two of …
Three security lessons from a year of crisis
Crime thrives in a crisis, and the coronavirus was the largest collective emergency that the world has faced for decades. While there are more heroes than villains in the …
Fraudulent content has a direct impact on consumer loyalty
Scams accounted for 59% of blocked user-generated malicious content during the first quarter of the year, according to a Sift report. The report examines how weaponized …
File security violations within organizations have spiked 134% as the world reopened for business
BetterCloud surveyed more than 500 IT and security professionals—and examined internal data from thousands of organizations and users—to understand their top challenges, …
62% of consumers believe hyperscale computing will have a positive impact over the next five years
A majority of consumers believe hyperconnectivity driven by hyperscale computing will positively impact them within five years, according to a report from Cadence Design …
3 tips for balancing data security and usability
Organizations have many challenges when it comes to cybersecurity, and one that is top of mind for many is striking the right balance between the usability of data and …
Most disaster recovery solutions are not tested on a regular basis
As organizations work diligently to support evolving business needs, while at the same time battling cybercrime and other threats to critical data, the majority of disaster …
Consumers trust organizations less after receiving scam messages claiming to represent them
Callsign revealed that the rise of scams is harming organizations’ reputations across the world. The global study of consumers revealed that just receiving a scam message …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)