Think Your Organization Has a Healthy Cybersecurity Culture?
If your organization has a healthy cybersecurity culture, consider yourself lucky — less ...
Study Ranks Healthcare and Insurance as Worst Custodians of Personal Data
Phishing remains a key attack vector for bad actors to compromise not just individual user ...
Ransomware – A Growing Menace for Healthcare Providers
In May 2017, the WannaCry ransomware took copious amounts of data hostage and demanded hefty ...
The BYOD Paradox: Personal Devices Expose Businesses to Cyber-Risk, But Employees Don’t Want Bosses Controlling Their Gadgets
BYOD programs have had a mixed track record over the years. Some say they increase mobility, ...
Building a Multi-Cloud Strategy? Be Sure to Address the Security and Management Challenges
Many organizations today are adopting a multi-cloud strategy, using services from several ...
Lack of Political Leadership in UK Jeopardizes Cyber Security of Critical Sectors, Report Says
The lack of political leadership to face targeted attacks is contributing to the poor job ...
Not a New Technique in Operation Shaheen Attack
The advanced attack targeting Pakistan described by Cylance mentions an evasion technique ...
Microsoft’s Data Collection Approach Violates GDPR, Hefty Fine Awaits
EU data protection legislation aims to give users more control over their personal data, and ...
Lax Employee Cybersecurity Habits Pose Growing Danger to Businesses
Employees’ cybersecurity habits are bad and getting worse. New research illustrates a ...
Ransomware Threat Alarmingly High for SMBs as They Place Security on the Back Burner
Small and medium-sized businesses are still a top target for ransomware attacks, and the ...
Under attack! Should your company ever “hack back”?
The threat of cyber attacks targeting businesses, specifically those breaches orchestrated ...
A Single Data Breach Can Rob You of 78% of Your Customers, Study Indicates
More than three-quarters of consumers would completely abandon a brand online if they heard ...
Comparing the OWASP Top 10 to the Real-World Top 10
Enterprise software is drowning in vulnerabilities and even organizations highly motivated ...
Small Companies, Big Security Concerns
Many people might tend to associate security breaches and malware attacks with large ...
U.S. Cybersecurity Sector Cries for Help as Demand for Talent Soars
Employer demand for cybersecurity professionals across the United States continues to soar, ...
Cloud Security Rises to Top of 2019 Cybersecurity Budget Priorities
As enterprises look toward the 2019 budget cycle, CISOs and other IT executives are ...
Non-EU Countries Work Hard to Comply with GDPR Even Though They Don’t Have to
In 2017, when the European Parliament announced plans to make the General Data Protection ...
37% of Ransomware Attacks Targeted Healthcare Organizations in Q3, Cyber Insurer Says
While industry reports claim ransomware attacks have dropped, cybersecurity insurance ...
Join Us at .NEXT London to Discuss Survival in HCI
“Survival” is usually associated with stoically pushing on through harsh conditions, ...
Old Malware on USB Drives Still Pose Potent Threat to Industrial Facilities, Research Shows
Technology players know all too well the implications of having malware moving around on USB ...
Almost Half of Organizations Have No Security Operation Center, Hindering Detection of Advanced Threats
Even though Security Operation Centers (SOCs) are increasingly common, some 48 percent of ...
DevSecOps: More Work Ahead
DevOps has come a long way since it got underway in full force nearly ten years ago. As was ...
High Churn Rate in Healthcare May Help Explain Sector’s Vulnerability to Phishing, Research Suggests
Healthcare lags behind most other industries in recognizing and reporting phishing attacks, ...