Threat highlight: Analysis of 5+ million unmanaged, IoT, and IoMT devices
A new study incorporates analysis of anonymized data from more than 5 million unmanaged, IoT, and IoMT devices in Ordr customer deployments across a variety of verticals …
How do cybercriminals secure cybercrime?
Trend Micro unveiled new insights analyzing the market for underground hosting services and detailing how and where cybercriminals rent the infrastructure that hosts their …
Emerging risk trends: Top risks to identify and address
Senior executives reported concerns around renewed outbreaks of the COVID-19 pandemic as their top emerging risk in the second quarter of 2020, according to Gartner. Gartner …
People work more while at home, but worry about data security
A global research report by Lenovo highlights the triumphs, challenges and the consequences of the sudden shift to work-from-home (WFH) during the COVID-19 pandemic and how …
Cloud services help adapt and respond to COVID-19 challenges
38 percent of businesses have scaled infrastructure to meet new levels of demand during the lockdown period (March-June), highlighting how the pandemic has accelerated …
Biomedical orgs working on COVID-19 vaccines open to cyber attacks
In a recently released report by the UK National Cyber Security Centre (NCSC), whose findings have been backed by Canada’s Communications Security Establishment (CSE) and the …
20% of credential stuffing attacks target media companies
The media industry suffered 17 billion credential stuffing attacks between January 2018 and December 2019, according to a report from Akamai. The apparent fourfold increase in …
Email impersonations becoming pervasive, preying on a distracted and dispersed workforce
Impersonations have become pervasive, and are by far the most prevalent type of email-based attack ending up in business’s inboxes. This is according to a survey report by …
Businesses express concerns around ethical risks for their AI initiatives
Businesses are entering a new chapter in AI implementation where early adopters may have to work harder to preserve an edge over their industry peers, according to Deloitte. …
Security alerts more than doubled in the last 5 years, SecOps teams admit they can’t get to them all
Sumo Logic announced the findings of a global survey that highlight the barriers security professionals are facing on the path to modernizing the security operations center …
Three major gaps in the Cyberspace Solarium Commission’s report that need to be addressed
Released in March 2020, the Cyberspace Solarium Commission’s report urges for the U.S. government and private sector to adopt a “new, strategic approach to cybersecurity,” …
New vulnerabilities in open source packages down 20% compared to last year
New vulnerabilities in open source packages were down 20% compared to last year suggesting security of open source packages and containers are heading in a positive direction, …