Spam over phone and email is changing consumer communication preferences
Of today’s main communications mediums – text, phone calls and email – consumers get the most spam over phone and email: 70% said they receive spam often over email and 51% …
CISOs are skeptical about claims made by cybersecurity vendors
There is a high level of skepticism about claims due to vague product descriptions, ambiguous statistics, limited ability to measure product effectiveness, and a general lack …
Worst passwords of 2019: Are you using one of them?
SplashData released their “Worst passwords of 2019” list, which includes the top 25 most dangerous and most commonly leaked passwords. In an interesting turn of …
What is the actual role of a threat hunter?
The role and tasks of a threat hunter are confusing, according to a ThreatQuotient and SANS study based on data collected from 575 participating companies that either work …
Most security pros admit to accidental internal breaches at their organization
44% percent of executives believe employees have erroneously exposed personally identifiable information (PII) or business-sensitive information using their company email …
Most DevOps pros feel proper certificate issuance policies slow them down
75% of DevOps professionals are concerned that policies for issuing certificates slow down development, and over a third (39%) believe developers should be able to circumvent …
SaaS security fears: Is your data exposed to potential risk?
IT executives have rising SaaS security fears, and worry about cloud security, proprietary data encryption, as well as the loss of independent control due to access …
What decentralized IT spending means for the CIO role
67% of IT leaders say at least half of their spend is now controlled by individual business units, in a report from IDG Connect and Snow Software. While most believe this is …
Consumers not willing to compromise when it comes to IoT security
Nearly three quarters of consumers expect manufacturers of connected IoT devices to protect their devices from hacks, according to Karamba Security. Consumers take IoT …
How identity is addressed by enterprise IT security teams
The majority of companies have experienced a five-fold increase in the number of workforce identities, which are being driven primarily by mobile and cloud technology. …
78% of people forgot a password in the past 90 days
Passwords are the dominant way online services manage access to our personal and work-related lives. But often times, they’re more of a headache than a security tool. HYPR …
Enterprises reaching a security tool tipping point
A rapid increase in the number of security tools used by large companies is limiting their return on investment while increasing the risk of cyber threats, according to …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users