Jul 31, 2019

New York Businesses Must Now Report a Breach Even if Private Data Was Merely ‘Viewed’

New York is joining other US states in expanding its definition of a data breach to include ...

Jul 30, 2019

Framework Aims to Enhance the Security of Software

Software is powering much of the world today, from the largest computing machines to the ...

Jul 29, 2019

Surprise: Healthcare Organizations Confident in Their Cybersecurity Efforts

Risk management firm LexisNexis Risk Solutions, in conjunction with Information Security ...

Jul 26, 2019

Breach Costs Keep Creeping Upward with Financial Fallout Lasting Years

The cost of data breaches keeps increasing for companies, and new research indicates that ...

Jul 25, 2019

Lost Business Remains Top Contributor to Data Breach Costs for a Fifth Straight Year

Costs associated with a data breach have surged this year to $3.92 million, according to ...

Jul 23, 2019

Data-Collecting Firms Have Only One Shot at Seeding Trust in Their Userbase, New Research Shows

As data protection authorities start to dish out GDPR-related fines, businesses in the US ...

Jul 23, 2019

Applying Machine Learning to Network Centric Security

Machine Learning enables network security solutions to enhance their ability to detect ...

Jul 22, 2019

[INFOGRAPHIC] What Is the Hidden Cost of Security?

With less than six months until 2020, experts forecast the industry will be struggling to ...

Jul 19, 2019

Cybersecurity a High Priority for 2019, UK Organizations Say

The financial impact of cybersecurity breaches on companies in the UK has climbed to a ...

Jul 18, 2019

One in 10 Firms Loses Over $10 Million from a Cyber Attack

Companies worldwide expect to boost cybersecurity investments by 34% in the next fiscal ...

Jul 17, 2019

Hospitals, Clinics in Los Angeles Hit by Data Breach

Phishing attacks strike again. Last week, Nemadji Research Corp., which does patient ...

Jul 16, 2019

Measuring Security Continuum Shift: Where Are You On Endpoints?

Cyber security pros often conceptualize a linear continuum of protection strategy: The left ...

Jul 15, 2019

Poor Healthcare Industry Security Hygiene Places Lives at Risk

No one wants to go to the doctor’s office. Well, I guess some people do. I’m certainly not ...

Jul 12, 2019

Disappointed by Cloud Security and High Cost, Organizations Move Data Back on Premises

The cloud-based approach is growing in popularity among businesses worldwide, with more ...

Jul 11, 2019

Bitdefender Expands Sandbox Workflows and Use-Cases with On-Prem Deployment

Bitdefender announces controlled availability release of GravityZone Sandbox Analyzer ...

Jul 10, 2019

GDPR Bares Its Fangs: €315 Million in Penalties over Just Three Days

In only three days, businesses big and small with customers in the European Union have been ...

Jul 09, 2019

AI in Cybersecurity Expected to Surpass $38 Billion

The market for AI in cybersecurity is expected to soar. According to the market research ...

Jul 08, 2019

Two Years After WannaCry, NHS Still Not Properly Safeguarded Against New Attacks

A combination of outdated computer systems, lack of investment, and a deficit of skills and ...

Jul 05, 2019

Vulnerabilities in US Defense Could Lead to Major Breach in Two Years, Says Black Hat Survey

After Russians used techniques such as spearphishing emails and troll farms to inundate ...

Jul 04, 2019

Most CISOs Believe Companies Stake Their Reputations on Cybersecurity Budgets, Survey Shows

Nine in 10 IT security professionals say their companies can improve their reputations by ...

Jul 03, 2019

Incident Response Lessons Learned from JPL Cybersecurity Fails

A few weeks ago, the U.S. federal bureaucrats from the NASA Office of the Inspector ...

Jul 02, 2019

Italian Regulator Fines Facebook €1 million in Cambridge Analytica Scandal

Fines don’t stop rolling when Facebook is involved. Italy’s data protection watchdog,  Il ...

Jul 01, 2019

Insider Threat Detection a Serious Problem for U.S. Businesses

Preventative security technologies like firewalls and application blacklisting aren’t always ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW