Please turn on your JavaScript for this page to function normally.
risk
How will recent risk trends shape the future of GRC

Risk management has never been more critical to organizations. The rate of change is happening faster than ever in our world. The kinds of risks facing organizations evolve …

shark
The biggest security threats to today’s businesses

While 94% of CIOs acknowledge some form of serious threat over the next 12 months, only 27% list business continuity and resilience as a top-three priority during the next 12 …

Okta
Microsoft and Okta confirm, detail impact of Lapsus$ gang’s attacks

Recent claims by the cyber extortion gang have been validated by Okta and Microsoft: Lapsus$ have managed to get their hands on some of Microsoft’s source code and have …

cloud
As breaches soar, companies must turn to cloud-native security solutions for protection

Over the past two years, companies’ adoption of public cloud services has surged, but fast-paced change and weaker security controls have led to an increase in data breaches, …

Okta
Lapsus$ gang says it has breached Okta and Microsoft

After breaching NVIDIA and Samsung and stealing and leaking those companies’ propertary data, the Lapsus$ cyber extortion gang has announced that they have popped …

Biohazard
Healthcare cybersecurity trends: Organizations not quite ready to deal with threats

Protected Harbor announced the launch of its latest whitepaper on healthcare cybersecurity which offers readers an insight into evolving healthcare data breach patterns, …

shark
Are you willing to take a calculated risk? Quantifying your cyber risk and predicting future threats

We can all agree that cyber attacks are inevitable. The next step for cybersecurity professionals is reaching a consensus on the best way to prepare for unknown threats …

hole
How to contain a privileged access breach and make sure it doesn’t happen again

When attackers pull off a privileged access breach, they have a beachhead into your network. Regardless of whether it’s software or users that are ill-protected, threat actors …

fix
The importance of building in security during software development

Checkmarx released the UK findings of its report which found that 45% of organizations have suffered at least two security breaches as a direct result of a vulnerable …

password
Organizations need to change their current password usage and policies, and do it fast

Password-related attacks are on the rise. Stolen user credentials including name, email and password were the most common root cause of breaches in 2021 with several …

Password
70% of breached passwords are still in use

SpyCloud announced a report that examines trends related to exposed data. Researchers identified 1.7 billion exposed credentials, a 15% increase from 2020, and 13.8 billion …

shield
Every business is a cybersecurity business

Hybrid working, with some staff dialing in remotely and others based in the office, forms the basis of how many organizations work, yet many businesses are still not fully …

Don't miss

Cybersecurity news