Nov 30, 2018

Think Your Organization Has a Healthy Cybersecurity Culture?

If your organization has a healthy cybersecurity culture, consider yourself lucky — less ...

Nov 29, 2018

Study Ranks Healthcare and Insurance as Worst Custodians of Personal Data

Phishing remains a key attack vector for bad actors to compromise not just individual user ...

Nov 28, 2018

Ransomware – A Growing Menace for Healthcare Providers

In May 2017, the WannaCry ransomware took copious amounts of data hostage and demanded hefty ...

Nov 27, 2018

The BYOD Paradox: Personal Devices Expose Businesses to Cyber-Risk, But Employees Don’t Want Bosses Controlling Their Gadgets

BYOD programs have had a mixed track record over the years. Some say they increase mobility, ...

Nov 26, 2018

Building a Multi-Cloud Strategy? Be Sure to Address the Security and Management Challenges

Many organizations today are adopting a multi-cloud strategy, using services from several ...

Lack of Political Leadership in UK Jeopardizes Cyber Security of Critical Sectors, Report Says

The lack of political leadership to face targeted attacks is contributing to the poor job ...

Nov 22, 2018

Not a New Technique in Operation Shaheen Attack

The advanced attack targeting Pakistan described by Cylance mentions an evasion technique ...

Microsoft’s Data Collection Approach Violates GDPR, Hefty Fine Awaits

EU data protection legislation aims to give users more control over their personal data, and ...

Nov 20, 2018

Lax Employee Cybersecurity Habits Pose Growing Danger to Businesses

Employees’ cybersecurity habits are bad and getting worse. New research illustrates a ...

Ransomware Threat Alarmingly High for SMBs as They Place Security on the Back Burner

Small and medium-sized businesses are still a top target for ransomware attacks, and the ...

Nov 16, 2018

Under attack! Should your company ever “hack back”?

The threat of cyber attacks targeting businesses, specifically those breaches orchestrated ...

Nov 15, 2018

A Single Data Breach Can Rob You of 78% of Your Customers, Study Indicates

More than three-quarters of consumers would completely abandon a brand online if they heard ...

Nov 14, 2018

Comparing the OWASP Top 10 to the Real-World Top 10

Enterprise software is drowning in vulnerabilities and even organizations highly motivated ...

Nov 13, 2018

Small Companies, Big Security Concerns

Many people might tend to associate security breaches and malware attacks with large ...

Nov 12, 2018

U.S. Cybersecurity Sector Cries for Help as Demand for Talent Soars

Employer demand for cybersecurity professionals across the United States continues to soar, ...

Nov 09, 2018

Cloud Security Rises to Top of 2019 Cybersecurity Budget Priorities

As enterprises look toward the 2019 budget cycle, CISOs and other IT executives are ...

Nov 08, 2018

Non-EU Countries Work Hard to Comply with GDPR Even Though They Don’t Have to

In 2017, when the European Parliament announced plans to make the General Data Protection ...

37% of Ransomware Attacks Targeted Healthcare Organizations in Q3, Cyber Insurer Says

While industry reports claim ransomware attacks have dropped, cybersecurity insurance ...

Nov 07, 2018

Join Us at .NEXT London to Discuss Survival in HCI

“Survival” is usually associated with stoically pushing on through harsh conditions, ...

Nov 06, 2018

Old Malware on USB Drives Still Pose Potent Threat to Industrial Facilities, Research Shows

Technology players know all too well the implications of having malware moving around on USB ...

Nov 05, 2018

Almost Half of Organizations Have No Security Operation Center, Hindering Detection of Advanced Threats

Even though Security Operation Centers (SOCs) are increasingly common, some 48 percent of ...

Nov 02, 2018

DevSecOps: More Work Ahead

DevOps has come a long way since it got underway in full force nearly ten years ago.  As was ...

Nov 01, 2018

High Churn Rate in Healthcare May Help Explain Sector’s Vulnerability to Phishing, Research Suggests

Healthcare lags behind most other industries in recognizing and reporting phishing attacks, ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW