cybersecurity
Multi-stage attack techniques are making network defense difficult
IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up to date technology, …
How well are healthcare organizations protecting patient information?
Healthcare organizations have high levels of confidence in their cybersecurity preparedness despite most of them using only basic user authentication methods in the face of an …
CVSS 3.1: Refined and updated for easier adoption by the security community
The Forum of Incident Response and Security Teams (FIRST) has published an update of its internationally recognized Common Vulnerability Scoring System (CVSS). CVSS is a …
How businesses can become more nimble and secure by moving to the cloud
Today’s business landscape is more dynamic than ever before. Organizations are being inundated with data, generated by an ever-increasing number of connected devices and …
Small and mid-sized organizations remain especially vulnerable to persistent compromises
Despite sophisticated prevention security tools, small to mid-sized organizations continue to be especially vulnerable to long lasting breaches due to their inability to …
Insights into end-user security awareness and behavior around phishing
Phishing remains a leading concern for organizations worldwide. A new Proofpoint report features analysis of data related to nearly 130 million cybersecurity questions and …
69% of organizations believe they can’t respond to critical threats without AI
Businesses are increasing the pace of investment in AI systems to defend against the next generation of cyberattacks, a study from the Capgemini Research Institute has found. …
The highly competitive global encryption management solutions market continues to grow
The increasing adoption of digitalization and globalization of enterprises have made IT resources prone to cyber attacks. This has increased the demand for encryption …
Inside the NIST team working to make cybersecurity more user-friendly
Cybersecurity is usually not a user’s primary duty, yet they suffer an increasing burden to respond to security warnings, maintain many complex passwords, and make security …
Prioritizing security efforts is key to data security in the cloud
32% of healthcare organizations store a wide range of sensitive data in the cloud, including healthcare data and personally identifiable information (PII) of customers and …
How mobile use cases in financial services are affecting security
Financial services organizations are increasingly exposed to cyber threats, according to Wandera. The report “Mobile Security in the Financial Services,” includes analysis …
The pervasive use of second screens endangers corporate IT networks
Despite techies having argued for years that having a second computer screen is a great way to improve productivity in the workplace, a new study from Gigamon has revealed …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA