Please turn on your JavaScript for this page to function normally.
Office 365
Attackers are exploiting IMAP to bypass MFA on Office 365, G Suite accounts

Where possible, and especially for important accounts such as Office 365 and G Suite accounts, the prevailing advice for users is to enable two-factor authentication. …

cybercrime
Cryptojacking of businesses’ cloud resources still going strong

In the past year or so, many cybercriminals have turned to cryptojacking as an easier and more low-key approach for “earning” money. While the value of …

Box files
Is your company leaking sensitive data via its Box account?

Companies that use Box for sharing files and folders inside and outside the company are inadvertently leaving sensitive corporate and customer data exposed, cybersecurity firm …

users
Cybersecurity skills gap worsens, security teams are understaffed

As emerging technology and threat landscapes experience rapid transformation, the skillsets need to change as well. 80 percent of 336 IT security professionals Dimensional …

leaders
Growing mobile cybersecurity incidents spur plans for increased security investment

A majority of RSA attendees plan to spend more on mobile security in the coming year, Lookout has discovered. Since critical data has moved to the cloud, employees are able to …

money
For enterprises, malware is the most expensive type of attack

The cost to companies from malware and “malicious insider”-related cyberattacks jumped 12 percent in 2018 and accounted for one-third of all cyberattack costs, according to …

collaboration
How are execs tackling cyber risk that comes with digital transformation?

There are notable gaps in organizations’ abilities to meet cybersecurity demands for the future, according to a new Deloitte survey. The report highlights the dissonance …

Chronicle creates Backstory, a cloud service for analyzing enterprises’ security data

Chronicle, the cybersecurity subsidiary of Alphabet (Google’s parent company), has announced Backstory, a cloud platform that can be used by enterprises to sift through …

programmer
Traditional cybersecurity staff retention tactics becoming less effective

The recipe for improving your organization’s ability to hire and retain cybersecurity professionals is relatively straightforward (if not easy): offer an attractive pay, …

businessman
Phishing, software supply chain attacks greatest threats for businesses

Attackers continue to use phishing as a preferred attack method, but have been forced to adapt their approach as anti-phishing tools and techniques are becoming more …

corporate cloud
How are businesses facing the cybersecurity challenges of increasing cloud adoption?

Cloud services serve core functions essential to all aspects of business operations, but getting cloud security right is still a challenge for many organizations, the 2019 …

Microsoft Azure
Azure AD Identity Protection now revolves around risky users and risky sign-ins

Launched in September 2018, Microsoft Threat Protection (MTP) integrates a number of Microsoft services to provide a fully integrated, end-to-end solution for securing the …

Don't miss

Cybersecurity news