82% of CIOs believe their software supply chains are vulnerable
The shift to cloud native development, along with the increased speed in development brought about by the adoption of DevOps processes, has made the challenges connected with …
Ransomware attacks keeping the educational sector on its toes
Financially motivated cybercriminals are taking advantage of schools’ need for uptime, their scarcity of cybersecurity defense resources, and lack of expertise compared to …
How to create awareness and mitigate data loss incidents
Nearly 60% of organizations experienced data loss or exfiltration caused by an employee mistake on email in the last 12 months. The most common types of confidential and …
Turning the tables on cyber attackers
Darktrace AI interrupts in-progress cyber-attacks in seconds, including ransomware, email phishing, and threats to cloud environments and critical infrastructure. In this Help …
BEC attacks have risen 53% year-over-year
Armorblox released a report which highlights the use of language-based attacks that bypass existing email security controls. The report uncovers how the continued increase in …
Healthcare-specific cybersecurity problems and how to address them
Sophisticated cyberattacks are crippling healthcare providers by posing a threat to core functions and patient privacy, according to Software Advice survey. Findings reveal …
Intelligence must drive strategic decisions
Today’s world is hyperconnected and there’s more freely available information than ever before. You would think that this would make it easier for companies to …
DDoS attackers continue to innovate, devising new threats and altering attack strategies
Corero Network Security has published the latest edition of its annual DDoS Threat Intelligence Report that compiles the trends, observations, predictions, and recommendations …
Why are many businesses still not using a password manager?
Why are we still talking about passwords? We already have single sign-on (SSO), and passwordless is the new buzzword everyone is talking about, but when you put yourself in …
Vishing attacks: What they are and how organizations can protect themselves
Vishing (voice phishing) involves defrauding people over the phone. Vishing cases have increased almost 550 percent during 2021, and vishing attacks have overtaken business …
Concentric’s AI technologies simplify and automate data security
Visit Concentric AI at RSA Conference 2022 – Early Stage Expo in the South Hall on the second level, booth 18. You’ll be able to see their product in action and …
CIOs and network engineers rank cybersecurity among the biggest risks
Network engineers and CIOs agree that cybersecurity issues represent the biggest risk for organizations that fail to put networks at the heart of digital transformation plans. …