Please turn on your JavaScript for this page to function normally.
risk
Hidden third-party tags could be leaving Fortune 100 companies at risk

Crownpeak found more than 1,700 tag redirectson websites belonging to companies in the Fortune 100. These hidden third-party tags leave the sites open to potential data …

users
Cybersecurity skills gap worsens, security teams are understaffed

As emerging technology and threat landscapes experience rapid transformation, the skillsets need to change as well. 80 percent of 336 IT security professionals Dimensional …

leaders
Growing mobile cybersecurity incidents spur plans for increased security investment

A majority of RSA attendees plan to spend more on mobile security in the coming year, Lookout has discovered. Since critical data has moved to the cloud, employees are able to …

money
For enterprises, malware is the most expensive type of attack

The cost to companies from malware and “malicious insider”-related cyberattacks jumped 12 percent in 2018 and accounted for one-third of all cyberattack costs, according to …

collaboration
How are execs tackling cyber risk that comes with digital transformation?

There are notable gaps in organizations’ abilities to meet cybersecurity demands for the future, according to a new Deloitte survey. The report highlights the dissonance …

fire
Organizations still ignoring a large piece of their cybersecurity defense

Organizations have long focused their cybersecurity positioning around prevention; however, with the sophistication and frequency of attacks increasing, more organizations are …

face
Users are too confident in their protection from threats

Most users care about online privacy and take some steps to make sure their data is protected, a new Malwarebytes survey has revealed. But some protection measures are too …

Headache
Attack traffic increased by 32 percent in 2018

Attack traffic observed by F-Secure’s network of decoy honeypots in 2018 increased by 32 percent over the previous year and increased fourfold in the latter half of 2018 …

Danger
How malware traverses your network without you knowing about it

A research report has been released which, based on observed attack data over the second half of 2018 (2H 2018), reveals the command-and-control and lateral activities of …

DevSecOps
The patterns of elite DevSecOps practices

As DevOps practices are maturing rapidly, organizations with elite DevSecOps programs are automating security earlier in the development lifecycle and managing software supply …

Cloud
Worldwide spending on public cloud services and infrastructure to increase 23.8% over 2018

Worldwide spending on public cloud services and infrastructure is forecast to reach $210 billion in 2019, an increase of 23.8% over 2018. Although annual spending growth is …

CEO
Enterprise attitudes to cybersecurity: Strategies to balance risk and business acceleration

IT decision makers are facing major challenges between dynamic adversaries, significant legislation and regulation requirements, business digital transformation needs, and a …

Don't miss

Cybersecurity news