Three steps to secure an organization during mergers and acquisitions
Since 2000, there have been over 790,000 merger and acquisition (M&A) transactions announced globally, consisting of a value over 57 trillion dollars. While these …
The not so scary truth about zero-day exploits
We don’t know what we don’t know; this is the quintessential problem plaguing security teams and the primary reason that zero-day exploits can cause such damage. …
Expanding threat landscape: Cybercriminals attacking from all sides
A research from Trend Micro warns of spiraling risk to digital infrastructure and remote workers as threat actors increase their rate of attack on organizations and …
HEAT attacks: A new class of cyber threats organizations are not prepared for
Web malware (47%) and ransomware (42%) now top the list of security threats that organizations are most concerned about. Yet despite the growing risks, just 27% have advanced …
Why EDR is not sufficient to protect your organization
Endpoint detection and response (EDR) tools are a cornerstone of most cybersecurity defenses today. But while the technology has an important role to play in investigating …
How prepared are organizations to face a ransomware attack on Kubernetes?
Veritas Technologies announced the results of a new study revealing that the majority of organizations are underprepared to face threats against their Kubernetes environments. …
Top 5 myths businesses believe about bots
Netacea announced the results from a new report showing that most businesses do not fully understand the threat bots pose, leaving those organizations vulnerable to threats. …
Severity of mobile threats rising, 10+ million mobile endpoints impacted
Zimperium published a report unveiling new data and comprehensive analysis of the state of mobile security worldwide. In 2021, the Zimperium zLabs team discovered threats …
Why a modern vulnerability management strategy requires state-of-the-art solutions
In this interview with Help Net Security, Stephen Carter, CEO at Nucleus Security, explains the importance of having a vulnerability management strategy within an …
Attackers using default credentials to target businesses, Raspberry Pi and Linux top targets
Findings from a Bulletproof report highlight the issue posed by poor security hygiene as automated attacks remain a high security threat to businesses. The research gathered …
How fast can organizations respond to a cybersecurity crisis?
Immersive Labs launched an analysis of human cyber capabilities. The report analyzed cyber knowledge, skills and judgment from over half a million exercises and simulations …
Are you willing to take a calculated risk? Quantifying your cyber risk and predicting future threats
We can all agree that cyber attacks are inevitable. The next step for cybersecurity professionals is reaching a consensus on the best way to prepare for unknown threats …