Untrained and Malicious Users Lead Concerns among IT Professionals in the UK
A new report published by KnowBe4 delves into the top security challenges and issues that IT ...
Security Professionals Say COVID-19 Crisis Increased Cyber Threat to Enterprise Systems
A survey of some of the top IT security professionals who participated in the annual Black ...
Enterprises Bring Security Bad Habits Along With Their Digital Transformation Efforts
As enterprises continue with their digital transformations by automating their manual ...
World Economic Forum Outlines Core Principles for Businesses Seeking to Reduce Cyber Risk
An optimistic new report by the World Economic Forum predicts businesses will prioritize ...
The Security of Legacy Devices Should Not Be the Bane of ISPs
The Internet of Things (IoT) ecosystems may be populated by all the latest and innovative ...
IT Departments May Be Helping Bad Actors with New Apps for Untrained Staff, New Research Shows
Rapid changes to how businesses operate offer excellent opportunities for malicious actors ...
SOC Teams Care Too Much About Detecting Cyberthreats and Not Enough About MTTD
The self-assessed effectiveness of corporate security operations centers (SOCs) seems to be ...
Half of U.S. Businesses Have Yet to Mandate New Security Policies for Remote Workers
Before the COVID-19 pandemic, more than 80% of Americans had worked from home either rarely ...
Most Employees Overestimate their Ability to Work Safely from Home, Study Finds
Most people are confident they can keep personal identifiable information (PII) secure while ...
One in Six Businesses Pay Ransom to Cybercriminals, New Research Shows
Last year, one in six businesses met ransom demands of cybercriminals, according to the most ...
Number of Breached Records Continues to Soar
We get so deluged with news stories about data breaches that it’s easy to lose sight of the ...
Small and Medium-Sized Enterprises to Increase Cyber Insurance Spending
Most small and medium enterprises (SMEs) are planning to increase their cyber-insurance ...
Cloud Security Spending to Buoy the Security Market in 2020
Enterprises are putting the brakes temporarily on security spending amid the chaos of the ...
Misconfigurations, Poorly Managed Access Help Drive Data Breach Risks
Enterprise digital transformations are making the jobs of enterprise security teams to ...
As Layoffs Loom, Be Cognizant of Increased Insider Risk
Since the very beginnings of the novel coronavirus (COVID-19) pandemic, businesses of all ...
Most Forbes Global 2000 Companies Lack Basic Domain Security
Most Forbes Global 2000 organizations don’t have even basic domain security in place, ...
The Cybersecurity Skills Gap Continues, with SOCs Lacking as Many as 10 Key Employees in 2020
The vast majority of security operations centers (SOCs) are confident in their ability to ...
Apple Announced Open Source Password Management Initiative
Passwords are a huge hassle. We all must use them, and generally hate doing so. There’s no ...
Business That Compromise User Data Could Lose Customer Loyalty for Years
Customers will avoid businesses that compromise users’ data during the COVID-19 pandemic ...
Half of Security Professionals Had No Contingency Plan in Place for COVID-19
Security has been a huge concern for both businesses and individuals as many employees ...
Bad Actors Target Unsecure Databases An Average of 18 Times Per Day, New Research Shows
Many companies accidentally leave their databases exposed on the web, and data breaches or ...
Credit-Card Skimming Malware Hit Websites As Coronavirus Lockdown Forced Retailers to Close High Street Stores
On March 20th, the Claire's accessories retail chain beloved by young girls around the world ...
Beyond the Hype – Putting MDR Service Providers to the Test with Forrester
Managed detection and response programs vary widely so carefully evaluate service provider ...
DDoS Attacks Are Getting Bigger, More Complex, Research Shows
Even though the number of DDoS attacks decreased over 2019, their complexity and size ...
It’s Time to Step Up Linux Server and Container Workload Security
Linux Server security historically pales in comparison to what has long been available for ...
'CallStranger' Is Exactly the Type of Vulnerability ISPs Fear
A new vulnerability named 'CallStranger' is making the rounds in the IoT world, illustrating ...
Frost & Sullivan: Advanced Cyber Threats Drive Increased Demand for Managed Detection and Response (MDR) Solutions
The increasing number of sophisticated cyber threats is set to increase demand for Managed ...
SMBs Overwhelmingly Believe They Are Ready to Deal with Cybersecurity Incidents
Most small and medium-sized businesses (SMBs) believe they are prepared for a cyberattack or ...
Clients Often Hold CEOs Personally Responsible for Ransomware Attacks, Research Shows
The general public is becoming increasingly well-educated about cyber-attacks and ransomware ...
Cyber Security Continues to Evolve—And the Skills Gap Remains a Big Challenge
Cyber security teams are continuing to struggle with hiring and retention issues, and they ...
Vast Majority of Australian Companies Believe Their Cybersecurity Is Failing
Australian companies don’t trust their current cybersecurity solution and overwhelmingly ...
Study Shows Cyber Security Disconnects
Organizations around the world consider innovation to be a top business priority and they ...
Why ISPs Should Keep Smart Homes Malware-Free
Most IoT devices have vulnerabilities that leave them open to DDoS attacks, according to ...
Building Sustainable CISO Succession Paths
The CISO role is rapidly evolving as organizations put more responsibility on the plates of ...
Security Misconfigurations a Leading Cause of Cloud Data Breaches
Eight in 10 companies across the United States have experienced a data breach made possible ...
Fewer Security Incidents Affected US Federal Government in 2019
The latest report from the White House's Office of Management and Budget (OMB) shows that ...
Half of Enterprises Have No Dedicated Staff, Processes or Policies for IoT Security
Global enterprises report greater efficiency and productivity, better product/service ...
Top 5 Endpoint Misconfigurations That Open Security Gaps [Whitepaper]
The term “cyberattack” brings to mind malware, social engineering, network vulnerabilities ...
Compliance Costs Are Eating Security Budgets
The cost of cybersecurity compliance is rising to unsupportable levels and enterprises are ...


