Please turn on your JavaScript for this page to function normally.
face
Bad habits and risky behaviors put corporate data at risk

IT and application development professionals tend to exhibit risky behaviors when organizations impose strict IT policies, according to SSH. Polling 625 IT and application …

measure
FIRST releases updated coordination principles for Multi-Party Vulnerability Coordination and Disclosure

The Forum of Incident Response and Security Teams (FIRST) has released an updated set of coordination principles – Guidelines for Multi-Party Vulnerability Coordination and …

mobile work
Small businesses unprepared for remote working, most don’t provide cybersecurity training

Stay-at-home orders for more than 40 states have forced millions of businesses to establish remote workforces that rely solely on internet-enabled applications and products to …

cloud storage
Enterprises regard the cloud as critical for innovation, but struggle with security

Most enterprises (85%) believe embracing the public cloud is critical to fuel innovation, but the majority are not equipped to operate in the cloud securely, according to a …

cloud
Cloud-enabled threats are on the rise, sensitive data is moving between cloud apps

44% of malicious threats are cloud enabled, meaning that cybercriminals see the cloud as an effective method for subverting detection, according to Netskope. “We are seeing …

HDD
Discrepancies between data sanitization policy creation and execution put data at risk

Although 96 percent of the 1,850 senior leaders within large organizations have a data sanitization policy in place, 31 percent have yet to communicate it across the business, …

globe
Top 10 policy trends to watch for globally in 2020

The 10 top trends that will drive the most significant technological upheavals this year have been identified by Access Partnership. “Shifts in tech policy will disrupt life …

DevOps
Most DevOps pros feel proper certificate issuance policies slow them down

75% of DevOps professionals are concerned that policies for issuing certificates slow down development, and over a third (39%) believe developers should be able to circumvent …

USB
Majority of IT departments leave major holes in their USB drive security

For the second year in a row, the majority of employers are failing to equip their employees with the appropriate technologies, procedures and policies to ensure data security …

email
Companies still don’t understand the importance of DMARC adoption

By implementing DMARC, brands lower the odds of their domains being spoofed and used for phishing attacks on recipients. Still, 79.7% of all domains analyzed have no DMARC …

iPhone
Most organizations plan to adopt new authentication solutions within two years

Enabling mobile device authentication with biometric-based access is the best approach to eliminate passwords, according to MobileIron. Percentage of respondents identifying …

Microsoft
Microsoft rolls out new tools for enterprise security and compliance teams

Microsoft has announced a number of new capabilities and improvements for tools used by enterprise administrators. New Microsoft 365 security and compliance centers The new …

Don't miss

Cybersecurity news