Please turn on your JavaScript for this page to function normally.
tracking
Lack of visibility into remote endpoints leaves companies vulnerable to ransomware

Illumio released findings on visibility and security practices for remote endpoints, revealing how vulnerable organizations are to ransomware propagating throughout the …

PC
93% of workers overshare online, causing security risks

Tessian reveals just how much, and how often, people divulge about their lives online and how attackers take advantage of it. With insights from both professionals and …

cloud
One-third of businesses have cloud budget overruns of up to 40%

More than one-third of businesses have cloud budget overruns of up to 40 percent, and one in 12 companies exceed this number, a Pepperdata survey of 750 senior enterprise IT …

Linux
Linux malware backdoors supercomputers

ESET researchers discovered Kobalos, a malware that has been attacking supercomputers – high performance computer (HPC) clusters – as well as other targets such as a …

SonicWall
Actively exploited SonicWall zero-day affects SMA 100 series appliances

SonicWall has confirmed that the actively exploited zero-day vulnerability spotted by the NCC Group on Sunday affects its Secure Mobile Access (SMA) 100 series appliances. …

ransomware
SMB ransomware extortion: Identifying pieces of the puzzle

2020 saw a new trend emerge: ransomware victims who were unwilling or unable to pay the ransom were faced with the threat of their sensitive information being exposed. Ponying …

account
How to motivate employees to take cybersecurity seriously

How can we push employees / users to take cybersecurity to heart? Dr. Maria Bada, external behavioral scientist at AwareGO, has been working on the answer for years. After …

digital transformation
Digital transformation plans have accelerated due to the pandemic

As organizational reliance on data continues to rise amid the pandemic, a Druva survey uncovered rising concerns among Indian businesses about data protection, the growing …

laptop
The first step in protecting ourselves is realizing that there’s a lot we can do to stay safe online

While the shift to a digital-first life was brought on by the global pandemic, U.S. consumers plan to keep it up – with online banking (61%), social engagements (56%), and …

CCAPS
CCAPS: New cybersecurity category that protects households and small businesses

We’re increasingly reliant on our networks to keep us working, entertained and connected to our loved ones. Networks ensure our kids get an education and have smart new toys …

BitDam
Download: The Phisher’s Playbook

The constant increase in phishing attacks and the damage they cause make all of us anxious, especially since they’re becoming harder to detect. To protect yourself from …

PAM solution
How do I select a PAM solution for my business?

In order for organizations to prevent becoming the next victim of a breach due to unauthorized third-party user access, as has happened in prominent recent breaches, a strong …

Don't miss

Cybersecurity news