cybersecurity
21% of all files in the cloud contain sensitive data
McAfee released its Cloud Adoption and Risk Report, which analyzed billions of events in anonymized customers production cloud use to assess the current state of cloud …
How to protect your organization from insider threats, the #1 risk for data loss
Is your security approach exposing your organization to risk? The answer is “yes” if your security strategy focuses exclusively on external threats. If the breaches of the …
Bring visibility to shadow APIs and ensure that security standards are being met
Last week Data Theorem introduced the industry’s first automated API discovery and security inspection solution aimed at addressing API security threats introduced by today’s …
Organizations feel ready to put highly sensitive data in the cloud
Many corporate employees are ready to store highly sensitive data in the cloud. However, many are still skeptical of the security posture of their own organizations, according …
Security should be a top priority when transitioning to an SD-WAN solution
Barracuda Networks today released key findings from a new global research report, “Security, Connectivity, and Control: The Challenges and Opportunities of …
Organizations want to threat hunt, but can’t due to lack of time, skills and visibility
As cybercriminals and nation-states continue to improve the sophistication of attacks that bypass traditional preventive defenses, organizations must evolve their security …
Increased dark web activity putting merchants and consumers at risk
Cybercriminals are increasingly targeting retailers and their customers through digital and social channels as retailers leverage new channels for increased revenue …
Top data and analytics risks that will concern audit executives in 2019
Risks surrounding data and analytics are the primary concerns of chief audit executives (CAEs) for 2019, according to Gartner. Based on a survey of 144 CAE clients, Gartner …
Consumer skepticism and stronger protections call for security changes
2018 became the year where protecting personal information established itself as a right that is wanted by and entitled to citizens. More people started questioning who owns …
Building shared digital identity using blockchain technology
I previously described challenges both consumers and organizations face when it comes to user identity and how a shared digital identity can reshape digital trust as we know …
Most security professionals fear AI attacks
Neustar released the most recent International Cyber Benchmarks Index, which highlights the increased year-over-year concern around security vulnerabilities, including …
Early adopter paradox: Consumers most excited about IoT are also most aware of privacy risks
Adoption of the Internet of Things continues to explode but it could be even more transformative, a new F-Secure survey finds. The consumers most eager to purchase new …
Featured news
Resources
Don't miss
- Radio signals could give attackers a foothold inside air-gapped devices
- Product showcase: RoboForm password manager for iOS
- LLMs are automating the human part of romance scams
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken