Key 2019 cybersecurity industry trends
Momentum Cyber revealed the most significant trends that will drive strategic activity in the cybersecurity industry in 2019 and will be prevalent themes at the RSA …
If an organization has been breached, it’s more likely to be targeted again
FireEye released the Mandiant M-Trends 2019 report at the RSA Conference. The report shares statistics and insights gleaned from Mandiant investigations around the globe in …
Phishers shift efforts to attack SaaS and webmail services
There was some good news and some bad news for the Internet-using public in early 2019. The good news is that the total number of conventional, spam-based phishing campaigns …
How malware traverses your network without you knowing about it
A research report has been released which, based on observed attack data over the second half of 2018 (2H 2018), reveals the command-and-control and lateral activities of …
The patterns of elite DevSecOps practices
As DevOps practices are maturing rapidly, organizations with elite DevSecOps programs are automating security earlier in the development lifecycle and managing software supply …
Worldwide spending on public cloud services and infrastructure to increase 23.8% over 2018
Worldwide spending on public cloud services and infrastructure is forecast to reach $210 billion in 2019, an increase of 23.8% over 2018. Although annual spending growth is …
Traditional cybersecurity staff retention tactics becoming less effective
The recipe for improving your organization’s ability to hire and retain cybersecurity professionals is relatively straightforward (if not easy): offer an attractive pay, …
Ongoing global cyber espionage campaign broader than previously known
A detailed analysis of code and data from a command-and-control server responsible for the management of the operations, tools and tradecraft behind the Operation Sharpshooter …
Enterprise attitudes to cybersecurity: Strategies to balance risk and business acceleration
IT decision makers are facing major challenges between dynamic adversaries, significant legislation and regulation requirements, business digital transformation needs, and a …
Human behavior can be your biggest cybersecurity risk
Changes in user behavior are increasingly blurring the lines between personal and business. Trends like Bring Your Own Device (BYOD) and flexible working often mean that …
A strong security posture starts with application dependency mapping
More and more organizations are turning to an agile DevOps culture as part of an ongoing digital transformation to their business, moving from monolithic application …
How cloud storage providers can preempt cyber attacks with business continuity
Cloud storage is now an integral part of almost every enterprise infrastructure and, as a result, security has become one of the most crucial elements of any cloud storage …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage