Please turn on your JavaScript for this page to function normally.
fake news
The economics behind global disinformation engines and strategies for mitigation

Online propaganda is a rapidly growing problem, leaving chaos, mistrust, and revolutions rumblings in its wake. Broad propaganda penetration is achieved by following a …

work from home
Enterprises observing uptick in risky behaviors since shift to remote work

Tanium released a report to evaluate the primary IT operations and security challenges organizations have faced amid the large-scale shift to remote work in the COVID-19 era, …

Cybercriminals continue to target trusted cloud apps

The majority of all malware is now delivered via cloud applications, underscoring how attackers increasingly abuse popular cloud services to evade legacy security defenses …

people
Customers willing to share personal data in exchange for personalized services

There is ample opportunity for financial institutions to harness the power of AI to build more meaningful connections and experiences with customers — vastly improving both …

analyst
Most IT security leaders lack confidence in their company’s security posture

78% of senior IT and IT security leaders believe their organizations lack sufficient protection against cyberattacks despite increased IT security investments made in 2020 to …

complex
Full-stack observability: The only way technologists can deal with IT complexity

AppDynamics released its global research study, exploring the impact of the rapid acceleration of digital transformation created in response to the COVID-19 pandemic and the …

industry
ICS threat landscape highlights

Dragos releases annual analysis of ICS/OT focused cyber threats, vulnerabilities, assessments, and incident response insights. “In 2020, the industrial community performed …

glasses
Emotional intelligence playing an increasingly important role for CISOs

The increasing importance of emotional intelligence and other skills required to work with different stakeholders are placing new demands on CISOs. However, it’s also creating …

Person
Hackers exploited Centreon monitoring software to compromise IT providers

Unknown hackers – possibly the Sandworm APT – have been compromising enterprise servers running the Centreon monitoring software for over three years, the French …

attacks
Malwarebytes was breached by the SolarWinds attackers

A fourth malware strain wielded by the SolarWinds attackers has been detailed by Symantec researchers, followed by the disclosure of the attackers’ ingenous lateral …

Work
Only 30% prepared to secure a complete shift to remote work

The biggest security concerns facing businesses are data leaking through endpoints (27%), loss of visibility of user activity (25%) and maintaining compliance with regulatory …

critical infrastructure
Expedited shifts to hybrid infrastructure and remote work challenges

There was a significant acceleration of cloud and colocation migrations, with 54 percent of IT leaders stating the pandemic has motivated their organization to move …

Don't miss

Cybersecurity news