Please turn on your JavaScript for this page to function normally.
professional
The Great Resignation meets the Great Exfiltration: How to securely offboard security personnel

“The Great Resignation” is a phenomenon that has greatly impacted how we work. As of August 2021, 65% of people in the United States were looking for a new job and 25% of them …

backup
Backup is key for cyber recovery

Granular and air-gapped backup are critical to data recovery, when, not if, a business falls victim to ransomware. Those are among the key takeaways from an Enterprise …

shark
New threat groups and malware families emerging

Mandiant announced the findings of an annual report that provides timely data and insights based on frontline investigations and remediations of high-impact cyber attacks …

thief
Slow deployment is hampering fraud prevention. What gives?

In May, Okta finalized its acquisition of Auth0 for $6.5 billion. Every company loves to add a shiny new toy to its arsenal, but this move sent a clear message to enterprise …

bomb
How fast do cybercriminals capitalize on new security weaknesses?

Threat intelligence analysts at Skybox Research Lab uncovered a 42% increase in new ransomware programs targeting known vulnerabilities in 2021. The report revealed how …

vault
Financial leaders grappling with more aggressive and sophisticated attack methods

VMware released a report which takes the pulse of the financial industry’s top CISOs and security leaders on the changing behavior of cybercriminal cartels and the defensive …

snake, threat
Strengthening the ability of public companies to combat cybersecurity threats

The National Association of Corporate Directors (NACD), SecurityScorecard and the Cyber Threat Alliance released a report that examines the U.S. Securities and Exchange …

BYOD
60% of BYOD companies face serious security risks

When employees began bringing shiny, new smartphones into the office in the late 2000s, many business and IT leaders spotted an opportunity. They recognized the …

Law legislation
The evolving role of the lawyer in cybersecurity

Cybersecurity is one of the most dynamic fields of law. Long gone are the days when organizations could rely entirely on defensive measures within their own environments for …

Keeper Security
Product Showcase: Keeper Security’s Enterprise Password Management platform

People often speak of cybersecurity as a technology challenge. But protecting data and IT infrastructure is also very much a matter of human behavior. Eighty-five percent of …

ransomware
How ready are organizations to manage and recover from a ransomware attack?

Zerto announced the findings of a ransomware study, revealing that gaps in readiness are seriously impacting the ability of many organizations to manage and recover from …

cloud
IT leaders require deeper security insights to confidently manage multi-cloud workloads

Gigamon released recent findings from a Pulse.qa study which surveyed IT and InfoSec leaders to identify challenges associated with advancing their multi-cloud strategies. …

Don't miss

Cybersecurity news