Security pros anticipate automation will reduce IT security headcount, but not replace human expertise
The majority of companies (77 percent) continue to use or plan to use automation in the next three years, according to a Ponemon Institute and DomainTools survey. The biggest …
A closer look at the global threat landscape
60% of initial entries into victims’ networks leveraged either previously stolen credentials or known software vulnerabilities, allowing attackers to rely less on deception to …
Cryptocurrency crime losses more than double to $4.5 billion in 2019
Cryptocurrency users, exchanges and investors suffered $4.5 billion in crypto-related losses resulting from thefts, hacks, and fraud, a CipherTrace report reveals. …
Employees aware of privacy risks, but unsure of how they affect the workplace
62 percent of employees are unsure if their organization has to comply with the recently-enacted CCPA, which gives California residents enhanced consumer data privacy rights, …
Crucial trends shaping the managed services market
Managed services remain healthy and profitable, with great opportunities for growth, including advanced security, automation, and business operations, a SolarWinds report …
Download: The (ISC)2 Exam Action Plan for CISSP, SSCP, or CCSP certification
Make this year your year for (ISC)² certification. Prepping for an (ISC)² credential is a big commitment. Maybe you’ve started on the path to achieving CISSP, SSCP or CCSP …
Half of cybercrime losses in 2019 were the result of BEC scams
Business email compromise (BEC) and email account compromise (EAC) scams are still the most lucrative schemes for cybercriminals: the FBI’s Internet Crime Complaint Center …
Emotet: Crimeware you need to be aware of
According to the U.S. Department of Homeland Security, Emotet continues to be among the most costly and destructive malware threats affecting state, local, and territorial …
Credential exposure report: Poor password habits still pose a serious threat
9,050,064,764 credentials have been recovered throughout 2019 which came from a total of 640 unique data breaches and include email addresses connected to plaintext passwords …
Mac threats are growing faster than their Windows counterparts
Mac threats growing faster than their Windows counterparts for the first time ever, with nearly twice as many Mac threats detected per endpoint as Windows threats, according …
The rise of human-driven fraud attacks
There has been a major spike in human-driven attacks – which rose 90% compared to six months previously, according to Arkose Labs. Changing attack patterns were felt across …
Download: IR Management and Reporting PowerPoint template
While the IR process is mostly technical, reporting to the organization’s management should take place on a much higher-level in order for the non-security savvy executives to …
Featured news
Resources
Don't miss
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services
- What types of compliance should your password manager support?