vulnerability
85% of breaches involve the human element
The 2021 Verizon Data Breach Investigations Report (DBIR) examines more breaches than ever before, and sheds light on how the most common forms of cyber attacks affected the …
Most organizations fail to fix cloud misconfiguration issues in a timely manner
A significant majority of companies that move to multi-cloud environments are not properly configuring their cloud-based services, Aqua Security reveals. According to the …
DevOps didn’t kill WAF, because WAF will never truly die
The web application firewall (WAF) is dead, they say, and DevOps is the culprit, found over the body in the server room with a blade in its hand and splattered code on its …
When exploit code precedes a patch, attackers gain a massive head start
Cybersecurity researchers that publicize exploit code used in cyberattacks are giving a clear and unequivocal advantage to attackers, new research conducted by Kenna Security …
Top security threats for power plants and how to proactively avoid them
Power plants are one of the most vitally important components of modern civilization’s infrastructure. A disruption in energy production impacts all aspects of society from …
Consumers aware of travel cyber risks, still not putting their digital wellness first
68% of Americans plan to travel for leisure this summer, with 12% doing so internationally, a McAfee survey reveals. While 68% of U.S. consumers report that they are connected …
Cloud compromise now the biggest cybersecurity issue for financial institutions
Infoblox unveils a research into how the COVID-19 shutdowns challenged the financial services industry’s core infrastructure. More than one year into the pandemic, …
Navigating the waters of maritime cybersecurity
In January 2021, new International Maritime Organization (IMO) guidelines on maritime cyber risk management went into effect. Around the same time, the U.S. government …
Why threat hunting is obsolete without context
Cybersecurity is an undisputed concern within any industry – but how are organizations and businesses using the security data and information they collect to best ensure their …
The best CISOs think like Batman, not Superman
Many CISOs see themselves as Superman — soaring overhead, cape fluttering, and ready to swoop in and save the day at a moment’s notice if a crisis arises. There have been …
A picture is worth a thousand words, but to hackers, it’s worth much more
Enterprises and end-users are constantly reminded of the dangers associated with clicking on unknown links and documents. Images rarely top the list as would-be …
Defending against Windows RDP attacks
In 2020, attacks against Windows Remote Desktop Protocol (RDP) grew by 768%, according to ESET. But this shouldn’t come as a surprise, given the massive increase in the number …
Featured news
Resources
Don't miss
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security
- Enterprise password audits made practical for busy security teams
- What zero trust looks like when you build it step by step
- Social data puts user passwords at risk in unexpected ways