Please turn on your JavaScript for this page to function normally.
person
Third party risk on the rise, risk mitigation still not a priority

Given today’s cyber security climate, it is no surprise that companies are wary of the risks associated with third party vendors. Unfortunately, these risks are only …

user
1 in 10 people have posed as someone else online

Our need for ease and convenience is putting our digital identities and security at risk. A new BehavioSec report finds that 37% of us have shared our personal security data …

The challenges of controlling IT complexity

IT teams overwhelmingly feel that today’s IT environments are very complex – and that growing complexity is making it more difficult for them to do their jobs successfully, …

Most users limit personal info on social media due to hacking fears

Only 10 percent of internet-using adults in America used at least one social networking site in 2005. More than a decade later that number has grown exponentially, with 84 …

Lock
Cybersecurity insurance: A global perspective

While the majority of global organizations say that it is “vital” their organization is insured against information security breaches, less than half (41%) are …

DDoS
DDoS aggression and the evolution of IoT risks

Few organizations globally are being spared DDoS attacks, according to a Neustar survey of over 1,000 IT professionals across six continents. With the bombardment fairly …

danger
Cybercriminals increasingly exploiting human nature

Cybercriminals are exploiting human nature as they rely on familiar attack patterns such as phishing, and increase their reliance on ransomware, finds the Verizon 2016 Data …

Nexus
Presidential primary election apps may expose sensitive data

Did you know that there are over 1,200 Android apps, both official and unofficial, that help voters keep track of the happenings in the US presidential primary? Better yet, …

mask
Attackers opt for discreet methods to spy inside the network

For its latest report, Vectra analyzed data from 120 customer networks comprised of more than 1.3 million hosts over the first quarter of 2016. All organizations showed signs …

Most organizations still lack visibility into database assets

Only 19 percent of organizations have what the organization considers to be “excellent” visibility into their data and database assets, according to Osterman …

Desk
Compromised credentials still to blame for many data breaches

Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance (CSA). Data breaches, account hijacking and …

industry
The future of ICS security depends on OT-centric security solutions

New cybersecurity operational technologies are emerging to protect industrial control systems (ICS) against impending IT threats and attacks. ABI Research indicates that …

Don't miss

Cybersecurity news