Please turn on your JavaScript for this page to function normally.
find
Challenges and benefits of using threat data feeds

Threat data feeds can help organizations strengthen their cybersecurity posture, according to a report from the Ponemon Institute. As cyberthreats proliferate, many …

hands
Distributed and remote work creating a perfect storm for network security teams

Distinct priorities have emerged when it comes to responding to the needs of IT security’s rapid transformation, a FireMon research has found. The survey of 500 cybersecurity …

remote workforce protection
Hidden areas of security and the future of hybrid working

The pandemic has changed how many companies operate in a short period of time. Over the last year we’ve witnessed most organizations with office-based workforces having to …

identity theft
Remote workers admit to playing a significant part in increasing their company’s cybersecurity risks

The COVID-19 generation of remote workers are admitting to playing a significant part in increasing the cybersecurity risks facing their companies. An Opinium research shows …

Work
IT leaders adapting to new challenges by prioritizing collaboration, cloud and security

CIOs and IT decision makers (ITDMs) are looking to maximize investments and drive innovation after a difficult year which raised the profile of IT leaders in driving critical …

Healthcare
Data breaches and network outages: A real and growing cost for the healthcare industry

One year into the COVID-19 pandemic, the Infoblox report reveals major challenges the healthcare industry faced as IT workers scrambled to secure protected health information …

tools
Rapid increase in security tools causing alert fatigue and burn out

On average, enterprises maintain 19 different security tools, with only 22% of such tools serving as vital to primary security objectives, a ReliaQuest survey reveals. The …

account
3 in 4 companies have experienced account takeover attacks in the last year

The COVID-19 pandemic has accelerated cloud migration and digital transformation amongst 88% of companies and that 71% of Microsoft Office 365 deployments have suffered an …

biohazard
Years-old MS Office, Word flaws most exploited to deliver malware

29% of malware captured was previously unknown – due to the widespread use of packers and obfuscation techniques by attackers seeking to evade detection, according to a HP …

bomb
Threat actors thriving on the fear and uncertainty of remote workforces

The pandemic’s work-from-home reality resulted in an unprecedented change for organizations as they fought to defend exponentially greater attack surfaces from cybercriminals …

Cybersecurity risk management
Risk management in the digital world: How different is it?

Managing risk arising from remote work has largely been reactive, and risk managers have had to adapt to new digital threats that weren’t necessarily as prevalent when work …

person
Digital-first lifestyle opens consumers to potential risks during tax season

Consumers have faced a lot of change over the past year with the shift to a digital-first lifestyle, and tax season with increasing risks is no exception. McAfee’s 2021 …

Don't miss

Cybersecurity news