Please turn on your JavaScript for this page to function normally.
traffic
Do public clouds make it more difficult to get visibility into data traffic?

The second annual Ixia 2018 Security Report analyzes how enterprise network attack surfaces are increasing as the perimeter of the traditional network expands into the cloud. …

bot
Public breaches drive increase in account takeover attempts

Distil Networks released The 2018 Anatomy of Account Takeover Attacks Report, based on data from 600 domains that include login pages. The study revealed that all monitored …

architecture
Why good security foundations are better than the best security mitigation

Since founding VDOO, we have been working to analyze a great many IoT devices, in the broadest way possible. The more we look into these devices and find their …

GDPR
Unsurprisingly, most won’t be ready for GDPR on 25th May

With less than a month until the GDPR comes into force, many companies will not be ready when it takes effect on May 25th, 2018. 62% of IT Decision Makers (ITDMs) surveyed …

organize
Only half of CI/CD workflows include appsec testing elements

Only half of CI/CD workflows include application security testing elements despite respondents citing awareness of the importance and advantages of doing so, according to a …

strategy
Adoption of security ratings platforms is on the rise

Forrester Consulting surveyed 158 security leaders to evaluate how enterprises are assessing and managing security threats to their IT infrastructure, as well as to their …

door
Small merchants are not effectively engaging with PCI programs

Smaller merchants are systematically failing to engage with PCI compliance programs, according to a new acquirer survey from Sysnet Global Solutions. The survey revealed that …

laptop
Can existing endpoint security controls prevent a significant attack?

Endpoint security solutions are failing to provide adequate protections to address today’s security threats, specifically malware, according to Minerva Labs. A majority of the …

glasses
Cyber risk assessment and disclosure requirements: What’s important to you?

In this podcast recorded at RSA Conference 2018, Jerry Caponera, VP cyber risk strategy at Nehemiah Security, offers some interesting thoughts on cyber risk assessment and …

insider
$8.76 million: The average yearly cost of insider threats

According to The Ponemon Institute’s report, “2018 Cost of Insider Threats: Global Organizations,” the average cost of an insider threat annually is $8.76 million. It’s …

question
Are your organization’s key assets at risk?

A new study conducted by the Ponemon Institute shows increases in threats and awareness of threats to knowledge assets, as well as improvements in addressing those threats by …

binary
SOCs require automation to avoid analyst fatigue for emerging threats

A survey conducted by LogicHub at RSA Conference 2018 identified 79 percent of respondents believe both human expertise and security automation is needed for a powerful …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools