IRS scams during tax season target unsuspecting consumers
Scam robocalls and phishing emails disguised as banks continue to trick consumers to put their personal information at risk, and tax season is no exception. Increase in …
Most enterprises choose multi-cloud strategies, 55% plan to invest in data virtualization
79% of enterprises want better integrated security and governance for their data in the cloud, a survey from AtScale reveals. “As more enterprises embrace cloud …
Devices on 5G networks demand differentiated security solutions
There will be 8.3 billion mobile broadband subscriptions by the end of 2024, which translates to 95 percent of all subscriptions by then, according to the SMU Office of …
More than 40% of privacy compliance technology will rely on AI by 2023
Over 40% of privacy compliance technology will rely on artificial intelligence (AI) by 2023, up from 5% today, according to Gartner. The research was conducted online among …
Cloud-based collaboration tools are a major driver of data exfiltration
Cloud-based collaboration technologies and workforce turnover have become major drivers of data exfiltration as insider threat programs fail to keep pace with today’s digital …
Cloud-enabled threats are on the rise, sensitive data is moving between cloud apps
44% of malicious threats are cloud enabled, meaning that cybercriminals see the cloud as an effective method for subverting detection, according to Netskope. “We are seeing …
IT and business process automation growing with cloud architectures
Many organizations are starting to realize the benefits of increased scale and velocity of application deployment in their businesses, according to F5 Networks. This value, …
Employees aware of privacy risks, but unsure of how they affect the workplace
62 percent of employees are unsure if their organization has to comply with the recently-enacted CCPA, which gives California residents enhanced consumer data privacy rights, …
The rise of human-driven fraud attacks
There has been a major spike in human-driven attacks – which rose 90% compared to six months previously, according to Arkose Labs. Changing attack patterns were felt across …
Discrepancies between data sanitization policy creation and execution put data at risk
Although 96 percent of the 1,850 senior leaders within large organizations have a data sanitization policy in place, 31 percent have yet to communicate it across the business, …
Mobile data roaming traffic generated by consumer and IoT devices expected to surge
Mobile data roaming traffic generated by consumer and IoT devices reached 737 Petabytes in 2019, according to Kaleido Intelligence. This is forecast to reach 2,000 Petabytes …
Scientists test forensic methods to acquire data from damaged mobile phones
Criminals sometimes damage their mobile phones in an attempt to destroy data. They might smash, shoot, submerge or cook their phones, but forensics experts can often retrieve …