Please turn on your JavaScript for this page to function normally.
risk
Businesses are ignoring third-party security risks

In the dynamic business landscape where third-party relationships assume a critical role, organizations confront various risks that can profoundly affect their security and …

connections
Employees worry less about cybersecurity best practices in the summer

IT teams are struggling to monitor and enforce BYOD (Bring Your Own Device) policies during summer months when more employees are often traveling or working remotely, …

AI
Popular generative AI projects pose serious security threat

Many popular generative AI projects are an increased security threat and open-source projects that utilize insecure generative AI and LLMs also have poor security posture, …

network
Businesses count the cost of network downtime

Fewer than one in ten CIOs can claim that they have avoided a network outage, according to Opengear. This finding is among new research by Opengear of both CIOs and network …

IT professional
Economic volatility drives businesses to MSPs

The current economic conditions are leading companies of all sizes to reassess their operations and business strategies to remain competitive and profitable, according to …

cloud
95% fear inadequate cloud security detection and response

Although numerous respondents acknowledged employing risky practices and behaviors within their cloud environments, they strongly believe in the effectiveness of their …

honeypot
Uncovering attacker tactics through cloud honeypots

Attackers typically find exposed “secrets” – pieces of sensitive information that allow access to an enterprise cloud environment — in as little as two minutes and, in …

ChatGPT
Compromised ChatGPT accounts garner rapid dark web popularity

Compromised credentials were found within the logs of info-stealing malware traded on illicit dark web marketplaces over the past year, according to Group-IB. The number of …

cloud
US and European IT decision-makers have different cloud security priorities

The growing adoption of cloud has elevated cloud security fear for IT teams, as they grapple with the challenges and concerns arising from the widespread use of complex cloud …

zero trust
Organizations actively embrace zero trust, integration remains a hurdle

IT teams have made security efforts and progress in zero-trust implementation strategies to establish a new sense of normalcy following the network upheaval caused by the …

STEM
Demand for STEM training skyrockets

The rapid pace of globalization, digital transformation, and AI advancements have created a renewed demand for digital and human skills among US learners, according to …

hands
Three cybersecurity actions that make a difference

Organizations that closely align their cybersecurity programs to business objectives are 18% more likely to achieve target revenue growth and market share and improve customer …

Don't miss

Cybersecurity news