Please turn on your JavaScript for this page to function normally.
botnet
1 out of 3 breaches go undetected

Organizations continue to struggle in detecting breaches as they become more targeted and sophisticated, with more than 1 out of 3 organizations citing their existing security …

USA
Pressure mounts on CISOs as SEC bares teeth with legal action

A Panaseer investigation into organizations’ annual 10-K filings reported to the SEC shows that from January-May 2024, at least 1,327 filings mentioned NIST – a key indicator …

OT
Improving OT cybersecurity remains a work in progress

Organizations have made progress in the past 12 months related to advancing their OT security posture, but there are still critical areas for improvement as IT and OT network …

burnout
Most cybersecurity pros took time off due to mental health issues

Cybersecurity and infosecurity professionals say that work-related stress, fatigue, and burnout are making them less productive, including taking extended sick leave – costing …

cybersecurity threats
Find out which cybersecurity threats organizations fear the most

This article compiles excerpts from various reports, presenting statistics and insights on cybersecurity threats faced by businesses and individuals alike. Cyber insurance …

vulnerabilities
Rising exploitation in enterprise software: Key trends for CISOs

Action1 researchers found an alarming increase in the total number of vulnerabilities across all enterprise software categories. “With the NVD’s delay in associating Common …

CVE
Edge services are extremely attractive targets to attackers

The cyber threat landscape in 2023 and 2024 has been dominated by mass exploitation, according to WithSecure. Edge service KEV vulnerability trends 64% of all edge service and …

GenAI
42% plan to use API security for AI data protection

While 75% of enterprises are implementing AI, 72% report significant data quality issues and an inability to scale data practices, according to F5. Data and the systems …

email threats
Malicious emails trick consumers into false election contributions

Major regional and global events – such as military exercises, political or economic summits, political conventions, and elections – drove cyber threat activities, according …

identity
The biggest downsides of digital ID adoption

As innovative digital verification methods continue to emerge, the debate around their reliability and effectiveness is heating up, according to Regula. Companies employ …

brain
GenAI keeps cybersecurity pros on high alert

“Businesses across every industry face unprecedented challenges posed by an increasing attack surface, zero-day vulnerabilities, cloud misconfigurations, and new emerging …

preparing career cybersecurity
Preparing for a career in cybersecurity? Check out these statistics

This article includes excerpts from various reports that provide statistics and insights on cybersecurity jobs, skills shortages, and workforce dynamics. Lack of skills and …

Don't miss

Cybersecurity news