Please turn on your JavaScript for this page to function normally.
security awareness
The era of passive cybersecurity awareness training is over

Despite increased emphasis on cybersecurity from authorities and high-profile breaches, critical gaps in vulnerability management within organizations are being overlooked by …

rail
Cyber threats to EU transport sector sends urgent call for enhanced cybersecurity

Between January 2021 and October 2022, the EU Agency for Cybersecurity (ENISA) analyzed and mapped the cyber threats faced by the transport sector, identifying prime threats, …

backup
Top 5 security risks for enterprise storage, backup devices

An average enterprise storage and backup device has 14 vulnerabilities, three of which are high or critical risk that could present a significant compromise if exploited, …

cyber
Bridging the cybersecurity readiness gap in a hybrid world

A mere 15% of organizations globally have the ‘mature’ level of readiness needed to be resilient against today’s modern cybersecurity risks, according to a …

resurrection
2022 witnessed a drop in exploited zero-days

Malicious threat actors have actively exploited 55 zero-days in 2022 – down from 81 in 2021 – with Microsoft, Google, and Apple products being most targeted. 53 …

programming
Data backup, security alerts, and encryption viewed as top security features

Half of U.S. businesses say that security is the most influential factor when buying software, according to Capterra’s Security Features Survey. In fact, 45% have stopped …

architecture
Most mid-sized businesses lack cybersecurity experts, incident response plans

99% of all businesses across the United States and Canada are mid-sized businesses facing cybersecurity challenges, according to a Huntress report. Aimed to gain insights into …

ChatGPT
How ChatGPT is changing the cybersecurity game

The cybersecurity industry can leverage GPT-3 potential as a co-pilot to help defeat attackers, according to Sophos. The latest report details projects developed by Sophos …

AI
Most security pros turn to unauthorized AI tools at work

Security experts are increasingly resorting to unauthorized AI tools, possibly because they are unhappy with the level of automation implemented in their organization’s …

traffic
Tracking the global spread of malware

Approximately 10-16 percent of organizations have shown evidence of malicious command and control (C2) activities, strongly indicating a network breach within the last year, …

identity
Navigating the future of digital identity

1,450 global consumers’ experiences with passwordless authentication, hybrid identities, and ownership over personally identifiable information reveal that they want …

phishing
Top 50 most impersonated brands by phishing URLs

Today, phishing is the fastest growing Internet crime, and a threat to both consumers and businesses. Finance, technology, and telecom brands were the most commonly …

Don't miss

Cybersecurity news