Apr 30, 2019

‘Ghost Users’ and Non-Expiring Passwords a Major Security Issue for Most Businesses

User and service accounts that are inactive and enabled (“ghost users”) are prime targets ...

Apr 29, 2019

The Great Cyber Security Talent Shortage Continues

We’ve been hearing a lot about the cyber security skills shortage for several years now, and ...

Apr 26, 2019

What Role Will Blockchain Have in Cyber Security and Risk Management?

Could blockchain play a major role in cyber security and risk management efforts at ...

Apr 25, 2019

Women Now Constitute 24% of the Cybersecurity Workforce

Most cybersecurity roles are still filled by men and pay disparity is still an issue. ...

Apr 24, 2019

EternalBlue Still Infecting Endpoints as Businesses Fail to Upgrade Systems or Apply Patches

A dangerous exploit that has helped criminals carry out several major cyber attacks in the ...

Researchers Uncover Threat Actor Supergroup Linked to Stuxnet, Flame, Duqu

Could critical infrastructure attacks be making a comeback? Or did these invisible threats ...

Apr 22, 2019

IoT Adopters Still Concerned about Deployment and Security in Their Ecosystem

Private users are not the only ones excited about IoT technology and gadgets in everyday ...

Apr 19, 2019

AI and Automation Seen as Silver Bullet in Overcoming Cybersecurity Skill Gap, Survey Finds

There’s been a lot of focus lately on the best ways to safeguard corporate networks and fend ...

Apr 17, 2019

Part Two: How Healthcare Cybersecurity Can Enable Innovation

As we covered in part one, there’s tremendous investment underway in healthcare IT and the ...

Apr 16, 2019

Why Ransomware Continues to Be an Immensely Profitable Business for Bad Actors

Ransomware, arguably the most efficient malware used by cybercrooks in recent years, ...

Apr 12, 2019

How Healthcare Cybersecurity Can Enable Innovation

In the past decade, we've witnessed amazing advancements in medicine. Our lives are being ...

Apr 11, 2019

DHS, FBI Alert: North Korean Backdoor Trojan HOPLIGHT Detected in the Wild, Linked to Lazarus

HOPLIGHT, a critical backdoor Trojan linked to North Korean APT group Lazarus, has been ...

Apr 10, 2019

Top-Rated Threat Intelligence for Businesses and Security Operations Centers

Cyber-attacks and threat actors have become more numerous and more sophisticated, creating ...

Apr 10, 2019

Critical Infrastructure Reps Fear What Hackers Might Do to Them in 2019

Incidents like the attack on Norsk Hydro are expected to grow more common, according to a ...

Apr 09, 2019

Agentless Workload Security with GravityZone and NSX-T 2.4 Data Center

VMware NSX-T Data Center 2.4 release now includes Guest Introspection services via agentless ...

Apr 05, 2019

Senator Elizabeth Warren Proposes Holding Negligent Executives Criminally Liable for Data Breaches

Senator Elizabeth Warren is proposing an amendment that would establish criminal liability ...

CISOs Latest Dilemma: How to Make the Most Out of Your Endpoint Security Solutions with Understaffed Teams

While digital transformation and the e-commerce bubble in late '90s have reshaped the way ...

Apr 04, 2019

Healthcare Industry Remains Cybersecurity Laggard

Healthcare organizations are still looking for a cybersecurity cure or at the very least an ...

Apr 02, 2019

Stark Disconnect Between Strategy and Execution as Companies Fail to Prioritize Protecting Business-Critical Apps

Most enterprises are aware that business disruption carries heavy costs, but still they fail ...

Apr 01, 2019

Manage Cybersecurity Efforts to Mitigate Your Enterprise Risks: Not To Established Controls

When it comes to managing cybersecurity risks, too many enterprises today remain focused on ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW