Hidden third-party tags could be leaving Fortune 100 companies at risk
Crownpeak found more than 1,700 tag redirectson websites belonging to companies in the Fortune 100. These hidden third-party tags leave the sites open to potential data …
Cybersecurity skills gap worsens, security teams are understaffed
As emerging technology and threat landscapes experience rapid transformation, the skillsets need to change as well. 80 percent of 336 IT security professionals Dimensional …
Growing mobile cybersecurity incidents spur plans for increased security investment
A majority of RSA attendees plan to spend more on mobile security in the coming year, Lookout has discovered. Since critical data has moved to the cloud, employees are able to …
For enterprises, malware is the most expensive type of attack
The cost to companies from malware and “malicious insider”-related cyberattacks jumped 12 percent in 2018 and accounted for one-third of all cyberattack costs, according to …
How are execs tackling cyber risk that comes with digital transformation?
There are notable gaps in organizations’ abilities to meet cybersecurity demands for the future, according to a new Deloitte survey. The report highlights the dissonance …
Organizations still ignoring a large piece of their cybersecurity defense
Organizations have long focused their cybersecurity positioning around prevention; however, with the sophistication and frequency of attacks increasing, more organizations are …
Users are too confident in their protection from threats
Most users care about online privacy and take some steps to make sure their data is protected, a new Malwarebytes survey has revealed. But some protection measures are too …
Attack traffic increased by 32 percent in 2018
Attack traffic observed by F-Secure’s network of decoy honeypots in 2018 increased by 32 percent over the previous year and increased fourfold in the latter half of 2018 …
How malware traverses your network without you knowing about it
A research report has been released which, based on observed attack data over the second half of 2018 (2H 2018), reveals the command-and-control and lateral activities of …
The patterns of elite DevSecOps practices
As DevOps practices are maturing rapidly, organizations with elite DevSecOps programs are automating security earlier in the development lifecycle and managing software supply …
Worldwide spending on public cloud services and infrastructure to increase 23.8% over 2018
Worldwide spending on public cloud services and infrastructure is forecast to reach $210 billion in 2019, an increase of 23.8% over 2018. Although annual spending growth is …
Enterprise attitudes to cybersecurity: Strategies to balance risk and business acceleration
IT decision makers are facing major challenges between dynamic adversaries, significant legislation and regulation requirements, business digital transformation needs, and a …
Featured news
Resources
Don't miss
- EU law enforcement training agency data breach: Data of 97,000 individuals compromised
- GitHub CISO on security strategy and collaborating with the open-source community
- Chainsaw: Open-source tool for hunting through Windows forensic artefacts
- Time for a change: Elevating developers’ security skills
- Job-seeking devs targeted with fake CrowdStrike offer via email