Please turn on your JavaScript for this page to function normally.
DNS
The role DNS plays in network security

New EfficientIP and IDC research sheds light on the frequency of the different types of DNS attack and the associated costs for the last year throughout the COVID-19 pandemic. …

email
What happens after a malicious email reaches employees’ inboxes?

On average, it takes three and half days (83 hours) from the moment a malicious email attack lands in an employees inbox, to when it is discovered by a security team or …

lock
Higher encryption adoption driven by rising data breach threats

Security and IT professionals in the Middle East are demonstrating a rising desire to secure critical applications and data, driving higher encryption adoption for newer use …

person
Cyberattacks target the anywhere workforce, legacy security systems can’t provide protection

VMware released a report based on an online survey of 3,542 CIOs, CTOs and CISOs in December 2020 from across the globe. The report explores the impact of cyberattacks and …

biohazard
Malware-related attacks jump by 54%

Extensive analysis of cyberthreats in 2020 reveals a 91% jump in attacks on industrial companies and a 54% rise in malware-related attacks compared to 2019. Medical …

tunnel light
Threat intelligence: The biggest blind spot for CISOs

More than 90 percent of CISOs rely on outdated, report-based threat intelligence that is often too old to inform decisions, according to Cybersixgill. The survey also found …

target
The most important point in a cyberattack is before it happens

Let’s get the scary thing out of the way: more than half of businesses have dealt with a serious security breach in the last two years. The chances of one happening are so …

endpoint protection
Endpoint complexities leaving sensitive data at risk

Absolute Software announced key findings from its report which shines a light on key trends affecting enterprise data and device security, and underscores the dangers of …

drown
The human cost of understaffed SOCs

SOC and IT security teams are suffering from high levels of stress outside of the working day – with alert overload a prime culprit, a Trend Micro study reveals. …

cloud
SeKVM: Securing virtual machines in the cloud

Whenever you buy something on Amazon, your customer data is automatically updated and stored on thousands of virtual machines in the cloud. For businesses like Amazon, …

TSA
New TSA security directive is a needed shock to the system

The Department of Homeland Security’s Transportation Security Administration (TSA) announced a Security Directive that will enable the Department to better identify, protect …

lock
How businesses can protect their brands and bottom lines against damage from illegal robocalls

March 17, 2021 was a milestone in the war on illegal robocalls. The FCC levied a $225 million fine — the largest in its history — on a telemarketer for making 1 billion …

Don't miss

Cybersecurity news