Please turn on your JavaScript for this page to function normally.
open
Retail and finance top the list of vulnerable industries, increasingly targeted with credential threat campaigns

The finance, professional, and information sectors had the highest volume and most variety of malicious activity in Q2 2018, says Rapid7, and the manufacturing sector is …

HP faxploit
Criminals can compromise company networks by sending malicious faxes

Check Point has revealed details about the two critical remote code execution vulnerabilities (CVE-2018-5924, CVE-2018-5925) it discovered in the communication protocols used …

data
Which SD-WAN product should enterprises choose?

Adoption of Software Defined Wide Area Network (SD-WAN) has reached an inflection point and nearly every distributed business is deploying, evaluating, or planning to …

strategy
There’s a global divide in how organizations assess cyber risk

Nearly 48 percent of organizations globally have embraced strategic vulnerability assessment – defined as mature or moderately mature programs that include targeted and …

business
Nearly 15% of US security budgets go to remediating active compromises

Malwarebytes and Osterman Research have polled 900 senior IT decision-makers and IT security professionals in Australia, Germany, the US, UK, and Singapore about the impact of …

zero
Where should companies focus as they begin their machine learning journey?

As machine learning has become more widely adopted across industries, O’Reilly set out to learn more about how companies approach this work. By surveying more than 11,000 data …

artificial intelligence
Most IT decision makers believe AI is the silver bullet to cybersecurity challenges

New research from ESET reveals that three in four IT decision makers (75%) believe that AI and ML are the silver bullet to solving their cybersecurity challenges. In the past …

employee
Cyber hygiene training is infrequent and inconsistent

Finn Partners Research released findings from its Cybersecurity at Work study that examined the level of cyber risk that employees pose to their organizations. The in-depth …

IoT
The FBI warns about compromised IoT devices

The FBI is instructing users on how to recognize when their IoT devices have been compromised and advising them on how to keep them secure. “Compromised devices may be …

alert
Google to warn G Suite admins of government-backed attacks

Google started warning Gmail users of state-sponsored attacks in 2012 and now the option has been made available to G Suite admins. What is G Suite? G Suite (formerly Google …

Skull
How the SamSam attacker stole millions from US companies

There are many reasons that the SamSam ransomware has achieved widespread notoriety: it disrupted the operations of some of its victims to a point that the attack …

blocks
Enterprise IT modernization: Replace prerelational DBMS systems

Prerelational database management systems (DBMSs) are aging technology, and the number of applications using these systems is declining. The market share for prerelational …

Don't miss

Cybersecurity news