Please turn on your JavaScript for this page to function normally.
arrows
The persistent struggle to improve SOC productivity reveals the need for newer SIEM technologies

On average, security personnel in U.S. enterprises waste approximately 25 percent of their time chasing false positives because security alerts or indicators of compromise …

mobile
As attackers get more creative, mobile threats and attacks increase in both quantity and impact

It is no longer a matter of if or when an enterprise’s mobile endpoints will be compromised. They already are and most organizations have little to no knowledge or visibility …

cloud
Public cloud data continues to grow, headed toward $500 billion by 2023

The worldwide public cloud services market grew 27.4% year over year in 2018 with revenues totaling nearly $183 billion, according to IDC. This growth rate, which is more than …

data
Whitepaper – Threat Intelligence Platforms: Open Source vs. Commercial

As a member of a maturing security team evaluating threat intelligence platforms (TIPs), you may be asking yourself whether you should use an open source solution like Malware …

hole
Week in review: Capital One breach, Visa payment limit bypass flaw, VxWorks RTOS vulnerabilities

Here’s an overview of some of last week’s most interesting news, interviews and articles: The dynamic of modern security challenges: Issues security leaders face …

US utilities targeted with spear-phishing emails impersonating engineering licensing board

If you worked in a US company in the utilities sector and received an email notification telling you that you’ve failed your “Fundamentals of Engineering” …

criminal
Five examples of user-centered bank fraud

In today’s digital-first world, banks and financial service companies need to allow their customers to easily manage money online in order to compete. Unfortunately, most …

USA
Research shows that devices banned by US government lack basic security practices

As the August 13 deadline looms for the US ban on Chinese surveillance cameras, the news cycle is re-engaged with the issue. The panic about banned cameras still being in …

Qualys Global IT Asset Discovery and Inventory
New infosec products of the week: August 2, 2019

Qualys is making its Global IT Asset Discovery and Inventory app available to all businesses for free Qualys is making its Global IT Asset Discovery and Inventory app …

cloud
Most interesting trends on cloud service and web usage

Cloud services account for 85% of all enterprise web traffic, signaling a need for enterprises to adopt a holistic approach to securing the cloud and web, a Netskope Cloud …

IoT
Many companies don’t know the depth of their IoT-related risk exposure

In the digital age, cyber is everywhere. Cyber risk now permeates nearly every aspect of how we live and work. Organizations should better understand how to manage the risks …

finance
94% of attacks hitting financial services use one of four methods

Newly released data from Akamai’s 2019 State of the Internet / Security Financial Services Attack Economy Report has found that 50% of all unique organizations impacted by …

Don't miss

Cybersecurity news