Please turn on your JavaScript for this page to function normally.
Log4j
How Log4Shell remediation interfered with organizations’ cybersecurity readiness

(ISC)² published the results of an online poll examining the Log4j vulnerability and the human impact of the efforts to remediate it. Cybersecurity professionals from around …

data
How to keep pace with rising data protection demands

The disconnect between business expectations and IT’s ability to deliver has never been more impactful, according to a Veeam report, which found that 89% of organizations are …

Magnify
Attackers used Dridex to deliver Entropy ransomware, code resemblance uncovered

Sophos released a research that details code similarities in the general purpose Dridex botnet and the little-known ransomware, Entropy. The similarities are in the software …

ransomware
Ransomware wreaked havoc last year, manufacturing was most targeted

IBM Security released its annual X-Force Threat Intelligence Index unveiling how ransomware and vulnerability exploitations together were able to “imprison” businesses in 2021 …

eavesdropping
How mobile app usage data could reveal a person’s identity

The time a person spends on different smartphone apps is enough to identify them from a larger group in more than one in three cases say researchers, who warn of the …

connected car
Automotive cybersecurity industry to reach $32.41 billion by 2030

The global automotive cybersecurity industry was pegged at $7.23 billion in 2020, and is expected to reach $32.41 billion by 2030, growing at a CAGR of 16.6% from 2021 to …

healthcare
Help Net Security: Healthcare Cybersecurity Report has been released

Our newest report takes a closer look at one of the most targeted industries today – healthcare. As exhausted healthcare professionals struggle with an extraordinary …

CIS
How configuration assessments help improve cyber defenses

There’s an old adage in business; if you’re not measuring something, you can’t manage it. These days, information technology (IT) and information security …

NDR
A comparison of NDR solutions: Deep packet inspection (DPI) vs. metadata analysis

Executive summary In today’s complex IT environments, Network Detection and Response (NDR) solutions are crucial to identify, assess, and respond to cyberthreats. Many NDR …

cloud
Multi-tool/multi-cloud environments reaching the limit of their efficacy

CloudBolt Software released its latest research report, examining industry sentiment in specific dimensions of hybrid cloud/multi-cloud, and aiming to uncover unmet cloud …

lock
Consumers don’t mind handing out their data for better user experience

In a global consumer survey, Axway finds that almost 60% of people believe it’s worth allowing companies to access their personal data if it means a better user …

password
MFA market to reach $34.7 billion by 2027

The global multi-factor authentication (MFA) market reached a value of $12.9 billion in 2021, and is expected to reach $34.7 billion by 2027, exhibiting a CAGR of 17.8% during …

Don't miss

Cybersecurity news