
Cardholders still dropping the ball when it comes to basic ID theft prevention
Four in 10 people with a credit or debit card have provided their full Social Security number in an online form in the past month, according to a new report from CompareCards, …

SOCs still overwhelmed by alert overload, struggle with false-positives
Security Operations Center (SOC) analysts continue to face an overwhelming number of alerts each day that are taking longer to investigate, leading five times as many SOC …

Cost of data breaches to surpass $5 trillion in 2024
A new report from Juniper Research found that the cost of data breaches will rise from $3 trillion each year to over $5 trillion in 2024, an average annual growth of 11%. This …

1 in 4 employees would steal company information to secure their next job
According to a survey of 476 IT security professionals at Black Hat USA 2019, nearly one in four (24%) said they would take company information to help apply for a position at …

Growing cloud adoption introduces visibility gaps and security complications
As the quantity and frequency of advanced threats continue to accelerate, a new SANS Institute survey found that a continued lack of visibility and the complexity of managing …

Attackers use large-scale bots to launch attacks on social media platforms
Social media sites have become lucrative targets for criminals looking for quick monetization. More than half of logins (53%) on social media sites are fraudulent and 25% of …

Enterprises are unable to effectively use data to drive decision-making
Actian polled over 300 IT professionals with key decision-making power in a company of at least 250 employees and asked them what their critical data management pains are. Key …

Cybersecurity challenges for smart cities: Key issues and top threats
Urban population is on the rise worldwide and smart city development projects are harnessing the power of the Internet of Things (IoT) to develop more intelligent, efficient, …

A point-in-time approach to risk management is no longer effective
Among organizations that engage third parties to provide business services, 83% identified third-party risks after conducting due diligence and before recertification, …

Most IT pros find red team exercises more effective than blue team testing
More than one-third of security professionals’ defensive blue teams fail to catch offensive red teams, a study from Exabeam reveals. The survey, conducted at Black Hat USA …

Ransomware attacks hit 1 in 5 Americans
Anomali announced the results of a survey conducted by The Harris Poll. It includes responses from more than 2,000 American adults and reveals how Americans believe business …

Deception technology shifts power back to the defender
Users of deception technology reported a 12X improvement in the average number of days it takes to detect attackers operating within an enterprise network when compared to …