
Online stores may not be as secure as you think
Credit card skimming is on the rise for the holiday shopping season, according to Malwarebytes. Online stores are not always as secure as you might think they are, and yet you …

Organizations rethink cybersecurity investments to meet NIS Directive requirements
Despite a 25% increase of the cost of major cyber incidents in 2022 compared to 2021, the new report on cybersecurity investment from ENISA reveals a slight increase of 0,4% …

Organizations’ serious commitment to software risk management pays off
There has been a significant decrease in vulnerabilities found in target applications – from 97% in 2020 to 83% in 2022 – an encouraging sign that code reviews, automated …

How effective compensation makes a difference with cyber talent retention
Aligning cybersecurity organization models with business objectives enables talent retention and security program success, according to IANS and Artico Search. CISOs’ …

Only 9% of IT budgets are dedicated to security
Despite their best efforts, 67% of businesses say they need to improve security and compliance measures with 24% rating their organization’s security and compliance strategy …

Internal audit leaders are wary of key tech investments
As the digital transformation of business accelerates, risk and internal audit leaders shift their focus to managing technology-driven risk, according to AuditBoard. The …

Traditional cloud security isn’t up to the task
In the last year, 47% of all data breaches originated in the cloud, and more than 6 in 10 respondents believe cloud security is lacking and poses a severe risk to their …

ChatGPT’s popularity triggers global generative AI investment surge
While AI is not a new technology – companies have been investing heavily in predictive and interpretive AI for years – the announcement of the GPT-3.5 series from OpenAI in …

Rise in automated attacks troubles ecommerce industry
Automated attacks on application business logic, carried out by sophisticated bad bots, were the leading threat for online retailers, according to Imperva. In addition, …

AI helps leaders optimize costs and mitigate risks
AI is dominating the mindshare of IT leaders this year and next, as 72% believe their organization will be using more AI in the next two to three years, according to Snow …

The new imperative in API security strategy
Of the 239 vulnerabilities, 33% (79 out of 239) were associated with authentication, authorization and access control (AAA) — foundational pillars of API security, according …

Generative AI is shaping future incident management processes
Persistent challenges in adhering to established incident management processes pose a significant risk to organizations, amplifying potential downtime costs amidst a surge in …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence