cybersecurity
Stringent password rules lower risk of personal data breaches
The all-too-common practice of using the same email address/password combination to log into multiple websites can be damaging, especially for employers with many users and …
Every month should be Cyber Security Awareness Month
In 2004, October was deemed National Cyber Security Awareness Month (NCSAM). This was an initiative promoted by the National Cyber Security Division (NCSD) within the …
Securing campus networks became more challenging
The results of a global Infoblox survey on the state of network security at higher education institutions reveals that 81 percent of IT professionals believe securing campus …
Identity spoofing is the most prevalent attack vector for the gaming and gambling industry
A new ThreatMetrix Cybercrime Report revealed that identity spoofing, fuelled by stolen identity data, is the most prevalent attack vector for the gaming and gambling …
Your backup data sets can become a treasure trove for advanced threat detection
Despite ever increasing investments in security technologies, data breaches and cyber incidents are increasing at a relentless rate, and the problem is projected to keep …
Most Fortune 50 companies unprepared for major DNS attack
ThousandEyes has found that 68 percent of the top 50 companies on the Global Fortune 500 rankings are not adequately prepared for the next major attack on the DNS. …
IIS attacks surge from 2,000 to 1.7 million over last quarter
IIS, Drupal, and Oracle WebLogic web technologies experienced increased attacks in Q2 2018. According to a new threat report from eSentire, IIS attacks showed a massive …
Growing intrusion trends: A perspective on today’s most sophisticated cyberattacks
According to a new CrowdStrike report, the technology, professional services, and hospitality sectors were targeted most often by cyber adversaries. The actors used a variety …
Cryptomining dethrones ransomware as top threat in 2018
Based on trends in the first half of 2018, Webroot found that cybercriminals are shifting to increasingly sophisticated and targeted means of attack while also expanding their …
Privileged account practices are poor, and IT security teams know it
One Identity released new global research that uncovers a widespread inability to implement basic best practices across identity and access management (IAM) and privileged …
Most consumers don’t trust companies to keep personal information secure
High-profile security breaches and changing regulations have raised consumer concerns and pressured businesses, establishing 2018 as a landmark year in the data economy. …
Four critical KPIs for securing your IT environment
In 2018, the average cost of a data breach is more than $3.75 million, and experts expect this number to rise in the coming years. This staggering—and potentially …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security