Fraudulent robocalls to cost consumers $40 billion in 2022
Consumers will lose $40 billion to fraudulent robocalls globally in 2022; rising from $31 billion in 2021, a Juniper Research study reveals. Fraudulent robocalls pose threats …
ORM software market to reach $2.6 billion in 2026
The global operational risk management (ORM) software applications market will grow from $1.5 billion in 2020, at a CAGR of 9%, to $2.6 billion in 2026, according to a study …
Digital key builds on past practices to create a more secure future
Too often, we assume that new technology replaces the old, but technology often builds off past generations, ideas, and success, rather than abandoning it altogether. Some …
Obstacles and threats organizations face when protecting AD
Attivo Networks announced the availability of a research report conducted by Enterprise Management Associates (EMA) which focuses on Active Directory (AD), exploring the …
91.5% of malware arrived over encrypted connections during Q2 2021
The latest report from the WatchGuard shows an astonishing 91.5% of malware arriving over encrypted connections during Q2 2021. This is a dramatic increase over the previous …
ATO attacks increased 307% between 2019 and 2021
Sift released a report which details the evolving methods fraudsters employ to launch account takeover (ATO) attacks against consumers and businesses. The report details a …
Organizations must reevaluate IT investments to advance their digital transformation
Organizations know that having the right IT in place and leveraging a cloud-first and data-centric mentality is essential in today’s digital economy. However, to advance their …
One in three IT security managers don’t have a formal cybersecurity incident response plan
Regardless of industry, information security incidents have become more of a targeted threat for businesses, increasing in amount and efficacy, according to the 2021 Data …
For adapting to new cloud security threats, look to “old” technology
With remote work and reliance on cloud computing here to stay, it’s no surprise how many headlines there are to address the growing cloud security concerns in our industry. …
Five proven techniques for building effective fraud management
Effective management of fraud has long been a vital capability within organizations, and for good reasons. According to the Association of Certified Fraud Examiners’ …
Large ransom demands and password-guessing attacks escalate
ESET released a report that summarizes key statistics from its detection systems and highlights notable examples of its cybersecurity research. The latest issue of the report …
How CISOs plan to accelerate the adoption of automation
ThreatQuotient released the State of Cyber Security Automation Adoption in 2021, new research focused on understanding the importance, challenges and trends facing businesses …
Featured news
Resources
Don't miss
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams
- CERT-UA warns against “security audit” requests via AnyDesk