cybersecurity

How to protect your organization from insider threats, the #1 risk for data loss
Is your security approach exposing your organization to risk? The answer is “yes” if your security strategy focuses exclusively on external threats. If the breaches of the …

Bring visibility to shadow APIs and ensure that security standards are being met
Last week Data Theorem introduced the industry’s first automated API discovery and security inspection solution aimed at addressing API security threats introduced by today’s …

Organizations feel ready to put highly sensitive data in the cloud
Many corporate employees are ready to store highly sensitive data in the cloud. However, many are still skeptical of the security posture of their own organizations, according …

Security should be a top priority when transitioning to an SD-WAN solution
Barracuda Networks today released key findings from a new global research report, “Security, Connectivity, and Control: The Challenges and Opportunities of …

Organizations want to threat hunt, but can’t due to lack of time, skills and visibility
As cybercriminals and nation-states continue to improve the sophistication of attacks that bypass traditional preventive defenses, organizations must evolve their security …

Increased dark web activity putting merchants and consumers at risk
Cybercriminals are increasingly targeting retailers and their customers through digital and social channels as retailers leverage new channels for increased revenue …

Top data and analytics risks that will concern audit executives in 2019
Risks surrounding data and analytics are the primary concerns of chief audit executives (CAEs) for 2019, according to Gartner. Based on a survey of 144 CAE clients, Gartner …

Consumer skepticism and stronger protections call for security changes
2018 became the year where protecting personal information established itself as a right that is wanted by and entitled to citizens. More people started questioning who owns …

Building shared digital identity using blockchain technology
I previously described challenges both consumers and organizations face when it comes to user identity and how a shared digital identity can reshape digital trust as we know …

Most security professionals fear AI attacks
Neustar released the most recent International Cyber Benchmarks Index, which highlights the increased year-over-year concern around security vulnerabilities, including …

Early adopter paradox: Consumers most excited about IoT are also most aware of privacy risks
Adoption of the Internet of Things continues to explode but it could be even more transformative, a new F-Secure survey finds. The consumers most eager to purchase new …

Businesses shift physical security systems to the cloud to access big data insights
A new study of 1500 IT decision makers from the UK, France and Germany has found a favourable shift towards cloud, as well as a need for businesses to adopt technology to …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act