Please turn on your JavaScript for this page to function normally.
backup
Data recovery depends on how good your backup strategy is

99% of surveyed IT decision makers state they have backup strategies in place, but just 26% have admitted they were unable to fully restore all data/documents when recovering …

ransomware
Which stolen data are ransomware gangs most likely to disclose?

If your organization gets hit by a ransomware gang that has also managed to steal company data before hitting the “encrypt” button, which types of data are more …

cloud
Increased cloud complexity needs stronger cybersecurity

A Thales report, conducted by 451 Research, reveals that 45% of businesses have experienced a cloud-based data breach or failed audit in the past 12 months, up 5% from the …

key
Using the random motion of electrons to improve cybersecurity

In October 2017, Yahoo! disclosed a data breach that had leaked sensitive information of over 3 billion user accounts, exposing them to identity theft. The company had to …

How to eliminate the weak link in public cloud-based multi-party computation

Secure multi-party computation (MPC) has seen steady evolution to tackle many scientific challenges. These include enabling the creation and tuning of AI or machine learning …

lock
The role of streaming machine learning in encrypted traffic analysis

Organizations now create and move more data than at any time ever before in human history. Network traffic continues to increase, and global internet bandwidth grew by 29% in …

email
Email encryption flexibility builds customer trust and business revenue

Intentional and unintentional data breaches in emails are not unusual, and since they are the backbone of communication, organizations need to keep their data protected. …

connection
Network intrusion detections skyrocketing

A WatchGuard report shows a record number of evasive network malware detections with advanced threats increasing by 33%, indicating a higher level of zero day threats than …

healthcare
Deploying pseudonymization techniques to protect health data

A report of the European Union Agency for Cybersecurity (ENISA) explores how pseudonymization techniques can help increase the protection of health data. The healthcare sector …

ransomware
Not enough businesses have a formal ransomware plan in place

A research from Thales has found that malware, ransomware and phishing continues to plague global organizations. In fact, 21% have experienced a ransomware attack in the last …

ransomware
What is Ransomware Protection as a Service?

Ransomware attacks have devastating consequences for many businesses. Those go beyond the monetary loss tied to ransom-encrypted data, and include disrupted operations, …

hardware security
Hardware security modules market to reach $7.9 billion by 2028

The global hardware security modules market size was valued at $3.1 billion in 2020 and is projected to reach $7.9 billion by 2028, growing at a CAGR of 12.4% from 2021 to …

Don't miss

Cybersecurity news