cybersecurity

7 steps security leaders can take to deal with Spectre and Meltdown
Security and risk management leaders must take a pragmatic and risk-based approach to the ongoing threats posed by an entirely new class of vulnerabilities, according to …

Why do we need a risk-based approach to authentication?
20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the …

A five-year analysis of reported Windows vulnerabilities
Based on analysis of all disclosed Microsoft vulnerabilities in 2017, a new Avecto report shows a significant rise in the number of reported vulnerabilities. Last year, 685 …

Here’s what keeps your CISO up at night
89.1 percent of all information security leaders are concerned about the rise of digital threats they are experiencing across web, social and mobile channels, according to the …

Financial services firms most adept at making balanced security investments
Cyber attacks cost financial services firms more to address and contain than in any other industry, and the rate of breaches in the industry has tripled over the past five …

Tackling the insider threat: Where to start?
Many organizations still believe the definition of an insider threat is limited to a rogue employee purposefully leaking embarrassing information, or nuking a couple of …

What CISOs prioritize in order to improve cybersecurity practices
In a new study by the The Financial Services Information Sharing and Analysis Center (FS-ISAC), CISOs weighed in on the most critical cyber-defense methods, frequency of …

Consumers want more IoT regulation
A demand for more regulation may seem counterintuitive in today’s world and yet that’s exactly what consumers who understand IoT technologies want, according to a new study …

How to ensure your IT and security teams stay aligned amid digital transformation
Even for sensitive industries, the movement to cloud-based technologies is generally accepted as a cost-effective and efficient infrastructure strategy and immediate priority. …

Cybercrime shifts: Rise of Russian cybercrime, attacks on cryptocurrency marketplaces
Cryptocurrency marketplaces, designed to facilitate trading on the full range of digital currencies, are experiencing a range of fraudulent activity. The world of …

February Patch Tuesday forecast: Key updates to act on
Love is in the air! Can’t you feel it? This Patch Tuesday falls the day before the most romantic day of the year – Valentine’s Day! We’ve been hearing …

Server-side exploits dominate the threat landscape
Skybox Security released its inaugural Vulnerability and Threat Trends Report, which analyzes vulnerabilities, exploits and threats in play in 2017. Cybercrime is a …