cybersecurity
Don’t start the blockchain revolution without making security a top priority
McAfee released a report detailing the numerous cybersecurity risks associated with blockchain-based cryptocurrencies, and asserts the necessity of making cybersecurity a top …
Europe and Russia home to half of credential theft victims worldwide
According to Blueliv’s credential detection data, since the start of 2018 there has been a 39% increase in the number of compromised credentials detected from Europe and …
DNS amplification attacks double in Q1 2018
DNS amplification types of DDoS attacks doubled in the first quarter of 2018 over last quarter, and spiked nearly 700 percent year-over-year, according to Nexusguard. …
Compliance worries prevent greater cloud use
New research released by WinMagic shows that 87% of ITDMs limit their use of the cloud because of the complexity of managing regulatory compliance. A quarter said, it meant as …
Has paying the ransom become business as usual?
Radware released its 2018 Executive Application and Network Security Report. For the first time in the survey’s five-year history, a majority of executives (53%) reported …
Cost of lagging DevOps and microservice enablement? $34 million per year
Despite the vast majority of cloud management decision-makers believing that DevOps and microservice enablement are important, very few believe that their organizations are …
How employee behavior impacts cybersecurity effectiveness
A recent OpenVPN survey discovered 25 percent of employees, reuse the same password for everything. And 23 percent of employees admit to very frequently clicking on links …
With the GDPR, companies face new era of compliance and transparency
A new Avecto survey explored IT and security’s role in helping companies achieve compliance with the new guidelines for the collection and processing of personal …
Protecting consumers from mobile and IoT threats
A new report by Allot Communications revealed a dynamic and automated threat landscape in which consumers lack the security expertise to effectively protect themselves. Mobile …
How third-party risk affects your GDPR compliance
In this podcast, Darron Gibbard, Chief Technical Security Officer EMEA at Qualys, discusses third-party risk and how it affects the GDPR compliance of your organization. …
Securing microservices and containers: A DevOps how-to guide
There is a simple reason for developers adopting the cloud and cloud-native application architectures. These “tools and methods” allow developers to accelerate innovation and …
Shape up US businesses: GDPR will be coming stateside
Despite the significant financial penalties, US consumers have tended to look away or forgive brands in the aftermath of a breach, but recent research shows that this is no …