Please turn on your JavaScript for this page to function normally.
insider threat
Enterprises are missing the warning signs of insider threats

Organizations struggle to identify the warning signs of insider threats, according to a report by the Ponemon Institute. The report surveyed a global pool of 1,249 IT and IT …

fix
Why should enterprises invest in machine identity management tools?

More than 60% of organizations don’t hold full awareness of certificates and keys across their digital assets, according to a research from AppViewX. Over the course of …

attacks
Increase in credential phishing and brute force attacks causing financial and reputational damage

Abnormal Security released a report which examines the escalating adverse impact of socially-engineered and never-seen-before email attacks, and other advanced email …

Kubernetes
Building for transactional workloads is the primary concern around deploying Kubernetes

Research conducted by Cockroach Labs and Red Hat shows 94% of organizations surveyed deploy services and applications on Kubernetes — but how they deploy varies widely. The …

mobile apps
Debunking myths about consumer expectations around mobile apps security

Appdome has released a global consumer survey which provides comprehensive insight into the complex and sophisticated security, malware and threat-defense expectations of …

upload
File upload security best practices rarely implemented to protect web applications

Despite a marked increase in concerns around malware attacks and third-party risk, only 8% of organizations with web applications for file uploads have fully implemented the …

lock
How enterprises use security operations to modernize their business

CyberRes published a report which provides insights into how enterprises are utilizing security operations to modernize their business, secure the digital value chain and …

privacy
Consumers value privacy more than potential savings when purchasing insurance

A recent survey by Policygenius explored consumer sentiment toward new tech being deployed by home and auto insurance companies. The survey found that most consumers prefer …

zero
Challenges organizations face when implementing zero trust architecture

98 percent of UK business leaders and IT decision makers either plan to or have already started implementing zero trust strategies at their organizations, according to …

Linux
Coinminers, web shells and ransomware made up 56% of malware targeting Linux systems in H1 2021

Trend Micro released a research on the state of Linux security in the first half of 2021. The report gives valuable insight into how Linux operating systems are being targeted …

container
Security and compliance still a challenge for container architectures

While adoption of container architectures and microservices continues at an impressive pace, maintaining automated and proactive security and compliance is a particularly …

sharing
Adverse security implications of enterprises network overprovisioning

Accedian released a research study examining the adverse security implications of network overprovisioning in enterprises and the common practices and concerns surrounding it. …

Don't miss

Cybersecurity news