Please turn on your JavaScript for this page to function normally.
supply chain
82% of CIOs believe their software supply chains are vulnerable

The shift to cloud native development, along with the increased speed in development brought about by the adoption of DevOps processes, has made the challenges connected with …

ransomware
Ransomware attacks keeping the educational sector on its toes

Financially motivated cybercriminals are taking advantage of schools’ need for uptime, their scarcity of cybersecurity defense resources, and lack of expertise compared to …

data
How to create awareness and mitigate data loss incidents

Nearly 60% of organizations experienced data loss or exfiltration caused by an employee mistake on email in the last 12 months. The most common types of confidential and …

Darktrace
Turning the tables on cyber attackers

Darktrace AI interrupts in-progress cyber-attacks in seconds, including ransomware, email phishing, and threats to cloud environments and critical infrastructure. In this Help …

BEC attacks have risen 53% year-over-year

Armorblox released a report which highlights the use of language-based attacks that bypass existing email security controls. The report uncovers how the continued increase in …

medical devices
Healthcare-specific cybersecurity problems and how to address them

Sophisticated cyberattacks are crippling healthcare providers by posing a threat to core functions and patient privacy, according to Software Advice survey. Findings reveal …

brain
Intelligence must drive strategic decisions

Today’s world is hyperconnected and there’s more freely available information than ever before. You would think that this would make it easier for companies to …

DDoS attackers continue to innovate, devising new threats and altering attack strategies

Corero Network Security has published the latest edition of its annual DDoS Threat Intelligence Report that compiles the trends, observations, predictions, and recommendations …

password managers
Why are many businesses still not using a password manager?

Why are we still talking about passwords? We already have single sign-on (SSO), and passwordless is the new buzzword everyone is talking about, but when you put yourself in …

phone call
Vishing attacks: What they are and how organizations can protect themselves

Vishing (voice phishing) involves defrauding people over the phone. Vishing cases have increased almost 550 percent during 2021, and vishing attacks have overtaken business …

brain
Concentric’s AI technologies simplify and automate data security

Visit Concentric AI at RSA Conference 2022 – Early Stage Expo in the South Hall on the second level, booth 18. You’ll be able to see their product in action and …

CIOs and network engineers rank cybersecurity among the biggest risks

Network engineers and CIOs agree that cybersecurity issues represent the biggest risk for organizations that fail to put networks at the heart of digital transformation plans. …

Don't miss

Cybersecurity news