Please turn on your JavaScript for this page to function normally.
money
Ransomware has become a cost of doing business

It’s easy to see why ransomware aimed at businesses is such a cash cow for criminals: for every Norsk Hydro and Fujifilm that refuses to pay the ransom, there is a …

risk
Mitigating third-party risks with effective cyber risk management

Third-party engagement has steadily become an essential part of business operations for many organizations, enlisted for all kinds of products and services across nearly all …

zero trust
The 6 steps to implementing zero trust

More often than not, organizations see zero trust as being an all or nothing proposition, where benefits will only be realized once everything in the system has been …

MacBook Pro
54% of all employees reuse passwords across multiple work accounts

Yubico released the results of a study into current attitudes and adaptability to at-home corporate cybersecurity, employee training, and support in the current global hybrid …

server
Quantum communications reaching record distances

The Cambridge Research Laboratory of Toshiba Europe announced a demonstration of quantum communications over optical fibres exceeding 600 km in length. The breakthrough will …

lock
Data security still a major concern for most consumers

A majority of Americans say they would like greater transparency in how companies handle and track their data, an Axway survey shows. The data privacy study asked 1,017 …

cloud
European cloud computing market to surpass $140 billion by 2028

Global Market Insights added a report on the European cloud computing market which estimates the market valuation will cross $140 billion by 2028 due to the government support …

passwordless
Can your MFA implementations stymie MFA bypass attacks?

Shay Nahari, Head of Red-Team services at CyberArk, says that they’ve been increasingly asked by customers to probe their multi-factor authentication (MFA) defenses, …

account
What happens to email accounts once credentials are compromised?

Agari researchers entered unique credentials belonging to fake personas into phishing sites posing as widely used enterprise applications, and waited to see what the phishers …

lock
Enhancing cyber resilience: What your team needs to know

In the wake of malicious attacks, we often witness everyone focusing on searching for those responsible, as opposed to how or why the attack took place and the most critical …

AI
For CISOs and artificial intelligence to evolve, trust is a must

Artificial Intelligence (AI) is no longer the future – it is already in use in our homes, cars, and, often, our pockets. As the technology continues to expand its role …

Microsoft Teams
Organizations leveraging Microsoft Teams exposed to potential risk

A survey conducted by Exec Survey and iGov Survey, reveals how over 200 unique organizations in the U.K. enabled seamless business continuity amid rapid societal change, where …

Don't miss

Cybersecurity news