Please turn on your JavaScript for this page to function normally.
mobile
BYOD: How to provide secure access to network resources

IT organizations have little or no choice when it comes to Bring Your Own Device (BYOD) programs. Employees want to access the network with their personally owned devices, and …

professional
The global decline of cybersecurity confidence

Tenable Network Security solicited insights from 700 security practitioners in nine countries and across seven industry verticals to calculate a global index score reflecting …

user
Intentional or not, insider threats are real

Despite the perception that hackers are a company’s biggest cybersecurity threat, insiders, including careless or naive employees, are now viewed as an equally important …

Eyes
65% of social engineering attacks compromised employee credentials

Social engineering is having a notable impact on organizations across a range of industrial sectors in the US. In fact, 60 percent of surveyed security leaders say their …

download
50% of enterprises will be cloud-first by 2021

SailPoint surveyed customers and attendees at this week’s Gartner IAM Summit about their plans for cloud adoption in the next five years. Of the 100 survey respondents, 30 …

Deepquest
Next level red teaming: Working behind enemy lines

The term “hacker” calls forth both positive and negative mental pictures, but I can bet that there are not many people, even in the infosec community, to whom the …

escalator
McAfee Labs predicts 14 security developments for 2017

Intel Security released its McAfee Labs 2017 Threats Predictions Report, which identifies 14 threat trends to watch in 2017. “To change the rules of the game between attackers …

Globe
Six key principles for efficient cyber investigations

Many organizations today are not equipped to defend against traditional cyberattacks, as demonstrated by the ever-increasing numbers of successful breaches reported daily – …

collaboration
How security collaboration will prove vital in 2017

The escalation of high-profile hacking and data dumps recently has underscored the increasing boldness of digital threat actors, culminating in July’s Democratic National …

danger
Ransomware success creates apathy towards traditional antivirus software

In the last 12 months, 48 percent of organizations across the globe have fallen victim to a ransomware campaign, with 80 percent indicating that they’ve suffered from three or …

vault
The decline of cyber resilience: Organizations unprepared to face attacks

Only 32 percent of IT and security professionals say their organisation has a high level of cyber resilience – down slightly from 35 percent in 2015, according to a global …

match fire
Cyber risk in advanced manufacturing: How to be secure and resilient

Nearly half of surveyed manufacturing executives lack confidence their assets are protected from external threats, according to a new study from Deloitte and the Manufacturers …

Don't miss

Cybersecurity news