Please turn on your JavaScript for this page to function normally.
cloud
Things that are easy to miss in the race towards hybrid working and the cloud

The mega-trend towards hybrid working and cloud migration seems unstoppable. But customer service organizations could find their wheels come off if they fail to address a …

BEC scams
Key email threats and the high cost of BEC

Area 1 Security published the results of a study analyzing over 31 million threats across multiple organizations and industries, with new findings and warnings issued by …

Work
As hybrid working arrangements remain, employers must ensure their staff works safely

Working from home has significantly increased cybersecurity vulnerabilities over the past two years, according to the world’s leading enforcement agencies. Employers must …

T-Mobile
T-Mobile data breach: New information uncovered by the investigation

In the wake of the recent claims that T-Mobile U.S. has suffered a massive data breach and the consequent industry reactions, the company has shared additional information its …

cloud complexity
The 3 Rs of visibility for any cloud journey

Dealing with an incident requires not just prompt notification of the incident, but the ability to triage the cause of the incident, the ability to carry out forensics, …

T-Mobile
T-Mobile data breach: Industry reactions

T-Mobile is investigating a claim that as many as 100 million accounts may have been compromised in a data breach. In a cybersecurity update, T-Mobile said: “We have …

ransomware
Most organizations experienced at least one ransomware attack, multiple attacks very common

One third of organizations worldwide have experienced a ransomware attack or breach that blocked access to systems or data in the previous 12 months. And for those that fell …

error
Reliance on third party workers making companies more vulnerable to cyberattacks

A survey from SecZetta revealed 83% of respondents agree that because organizations increasingly rely on contractors, freelancers, and other third party workers, their data …

arrows
Stop the breaches! Four steps to minimize security risks

Ransomware, mobile phone hacks, and other cyber-attacks are an everyday occurrence, making cybersecurity one of the most pressing concerns for companies around the world. …

Unwanted bot traffic costs businesses $250 million a year

Netacea announced results from a report that reveals the high price that businesses pay because of unwanted bot traffic. According to survey respondents, automated bots …

money
While IT budget allocations for cybersecurity are significant, data breaches still very common

While IT security decision makers often consider cyberattacks a serious concern and are allocating a significant share of their IT budget to address their cybersecurity …

zero
Organizations aware of the importance of zero trust, yet still relying on passwords

Organizations have become more security conscious over the course of the pandemic, leading them to invest heavily in zero trust, according to a study from identity firm Okta. …

Don't miss

Cybersecurity news