enterprise
Cryptojacking of businesses’ cloud resources still going strong
In the past year or so, many cybercriminals have turned to cryptojacking as an easier and more low-key approach for “earning” money. While the value of …
Is your company leaking sensitive data via its Box account?
Companies that use Box for sharing files and folders inside and outside the company are inadvertently leaving sensitive corporate and customer data exposed, cybersecurity firm …
Cybersecurity skills gap worsens, security teams are understaffed
As emerging technology and threat landscapes experience rapid transformation, the skillsets need to change as well. 80 percent of 336 IT security professionals Dimensional …
Growing mobile cybersecurity incidents spur plans for increased security investment
A majority of RSA attendees plan to spend more on mobile security in the coming year, Lookout has discovered. Since critical data has moved to the cloud, employees are able to …
For enterprises, malware is the most expensive type of attack
The cost to companies from malware and “malicious insider”-related cyberattacks jumped 12 percent in 2018 and accounted for one-third of all cyberattack costs, according to …
How are execs tackling cyber risk that comes with digital transformation?
There are notable gaps in organizations’ abilities to meet cybersecurity demands for the future, according to a new Deloitte survey. The report highlights the dissonance …
Chronicle creates Backstory, a cloud service for analyzing enterprises’ security data
Chronicle, the cybersecurity subsidiary of Alphabet (Google’s parent company), has announced Backstory, a cloud platform that can be used by enterprises to sift through …
Traditional cybersecurity staff retention tactics becoming less effective
The recipe for improving your organization’s ability to hire and retain cybersecurity professionals is relatively straightforward (if not easy): offer an attractive pay, …
Phishing, software supply chain attacks greatest threats for businesses
Attackers continue to use phishing as a preferred attack method, but have been forced to adapt their approach as anti-phishing tools and techniques are becoming more …
How are businesses facing the cybersecurity challenges of increasing cloud adoption?
Cloud services serve core functions essential to all aspects of business operations, but getting cloud security right is still a challenge for many organizations, the 2019 …
Azure AD Identity Protection now revolves around risky users and risky sign-ins
Launched in September 2018, Microsoft Threat Protection (MTP) integrates a number of Microsoft services to provide a fully integrated, end-to-end solution for securing the …
How today’s workforce stays secure and what apps it prefers
User-focused security apps KnowBe4, LastPass, and Proofpoint dominate the list of fastest growing apps within enterprises, according to Okta. “KnowBe4 in particular is …