Please turn on your JavaScript for this page to function normally.
city night
Cybersecurity challenges for smart cities: Key issues and top threats

Urban population is on the rise worldwide and smart city development projects are harnessing the power of the Internet of Things (IoT) to develop more intelligent, efficient, …

Arrows
A point-in-time approach to risk management is no longer effective

Among organizations that engage third parties to provide business services, 83% identified third-party risks after conducting due diligence and before recertification, …

collaboration
Most IT pros find red team exercises more effective than blue team testing

More than one-third of security professionals’ defensive blue teams fail to catch offensive red teams, a study from Exabeam reveals. The survey, conducted at Black Hat USA …

Skull
Ransomware attacks hit 1 in 5 Americans

Anomali announced the results of a survey conducted by The Harris Poll. It includes responses from more than 2,000 American adults and reveals how Americans believe business …

eye
Deception technology shifts power back to the defender

Users of deception technology reported a 12X improvement in the average number of days it takes to detect attackers operating within an enterprise network when compared to …

architecture
Digital transformation helps companies work smarter yet makes them vulnerable to breaches

While digital transformation helps companies work smarter, there is a risk that the ongoing digitization may unlock a host of security vulnerabilities that can cost companies …

DDoS
The changing face of DDoS attacks: Degraded performance instead of total takedown

The number of DDoS attacks might be getting higher, but they are not all massive nor do they always trigger DDoS defenses. In fact, small-scale DDoS attacks are becoming more …

ransomware
What’s cybercriminals’ most effective weapon in a ransomware attack?

Cybercriminals’ most effective weapon in a ransomware attack is the network itself, which enables the malicious encryption of shared files on network servers, especially files …

Privacy Shield
There is widespread business confusion and ignorance about the upcoming CCPA regulation

ESET polled 625 business owners and company executives to gauge business readiness for the upcoming California Consumer Privacy Act (CCPA), which goes into effect on January …

editor
FSI organizations are failing to assess their software for security vulnerabilities before release

More than half of organizations have experienced theft of sensitive customer data or system failure and downtime because of insecure software or technology, a Synopsys report …

IoT
Many companies don’t know the depth of their IoT-related risk exposure

In the digital age, cyber is everywhere. Cyber risk now permeates nearly every aspect of how we live and work. Organizations should better understand how to manage the risks …

brain
Companies struggle with the slow, unpredictable nature of AI projects

Despite significant investment in AI, many companies are still struggling to stabilize and scale their AI initiatives, according to Dotscience. While 63.2% of businesses …

Don't miss

Cybersecurity news