Please turn on your JavaScript for this page to function normally.
face
How privileged insiders threaten the security of global organizations

A new global survey from BeyondTrust explores the visibility, control, and management that IT organizations in the U.S., APAC, Europe and the Middle East have over employees, …

payments
Will biometrics replace passwords for online payment authentication?

Over half of consumers in the UK (53 percent) are worried that the shift to biometrics to authenticate online payments will dramatically increase the amount of identity fraud, …

lock
Advancing transparency and accountability in the cybersecurity industry

NSS Labs, the Texas-based company that specializes in testing the world’s security products, has a new CEO. Jason Brvenik, the company’s CTO since early 2017, took over …

cloud complexity
Embrace chaos to improve cloud infrastructure resilience

Netflix is a champion of using chaos engineering to improve the resilience of its cloud infrastructure. That’s how it ensures its customers don’t have their Stranger Things …

firefighters
2018 in numbers: Data breaches cost $654 billion, expose 2.8 billion data records in the U.S.

Cybercriminals exposed 2.8 billion consumer data records in 2018, costing over $654 billion to U.S. organizations, according to ForgeRock. Cyberattacks to U.S. financial …

criminal
Despite disclosure laws, cybercrime may be widely underreported

While attack vectors remain largely the same year over year, attack volume will increase and cybercrime may be vastly underreported, according to the 2019 State of …

data
Unclassified data creates security blind spots for most companies

Global businesses continue to house ‘dark data’ within their organizations, creating a honeypot for cybercriminals, finds research from Veritas Technologies. The …

brain
Is AI fundamental to the future of cybersecurity?

While a significant proportion of SMEs believe in their current approach to security, they are struggling when it comes to allocation of budget, according to a Senseon …

Hand
How organizations are managing vulnerability risks

Tripwire evaluated how organizations are managing vulnerability risks and found that more than one in four (27 percent) globally have been breached as a result of unpatched …

Field-programmable gate arrays
Scientists uncover vulnerability in FPGAs, affecting cloud services and IoT

Field-programmable gate arrays (FPGAs) are, so to say, a computer manufacturer’s “Lego bricks”: electronic components that can be employed in a more flexible …

Car
How likely are weaponized cars?

It is easy to become absorbed by the exaggerated Hollywood depictions of car hacking scenarios – to imagine a not-so-distant future when cars or their supporting …

zero
Why zero trust is crucial to compliance

The enterprise faces a brand new world when it comes to data privacy and security. New regulations like the General Data Protection Regulation (GDPR) and the California …

Don't miss

Cybersecurity news