Seizing the Cloud Security Opportunity
Attacks or misconfigurations exposed sensitive cloud-hosted data from companies such as ...
BEC Attacks Drastically Increased in August, Report Finds
Not all BEC attacks are about large frauds Attackers spend a long time finding vulnerable ...
Many Consumers Don’t Trust the Way Companies are Using Their Data—and Businesses Need to Change that Perception
Data privacy, particularly for personally identifiable information, has become more ...
CISA Urges Businesses to Patch Domain Controller Netlogon Flaw
CISA is aware of active exploitation of Netlogon bug A remote attacker can exploit the ...
Phishers Target Businesses with Fake GDPR Compliance Requests
New phishing campaign uses the European Union’s General Data Protection Regulation (GDPR) ...
ISPs Can and Should Protect Users Against DDoS Attacks
Household IoT devices face an ever-increasing risk without proper security Hackers ...
Most SMBs Prepare for an Attack in the Next Six Months, Survey Shows
SMBs are not prepared for security incidents but are looking for more protection ...
Seven in Ten CISOs Believe Cyberwarfare Is an Imminent Threat to Their Organisations
Most CISOs are concerned about the threat of cyberwarfare to their organisation yet a lot of ...
Healthcare Institutions Fall Short of National Cybersecurity Standards
Healthcare breaches continue in high numbers Vendor report details minority of healthcare ...
Does Your Business Have a Well-Known URL for Changing Passwords? It Should!
Your customers can be helped to change their weak passwords All your company needs to do is ...
Zerologon: How Bitdefender Protects Customers from this No-Credential Post-Exploit Technique
Zerologon is a zero-credential vulnerability that exploits Windows Netlogon to allow ...
IoT Devices Ship with Security Flaws Because Profit Drive the Market
The main driver of the IoT market is not innovation and the final product suffers The IoT ...
COVID-19 Amplifies CISOs’ Concerns about Doing More with Less
Chief Information Security Officers are preparing for an average of 3.3 security compliance ...
Researchers Identify the Departments and Industries Most Susceptible to Email-Based Cyber-Attacks
Simulated phishing campaign reveals recipients typically open the email 50% of the time, 32% ...
Telehealth Now the Biggest Cyber-Threat to Healthcare, New Data Shows
The adoption of telehealth vendors has significantly expanded healthcare providers' attack ...
Ransomware Was the Top Cyber Insurance Claim in Q1 2020
Ransomware retakes the lead (from business email compromise) as the top cyber insurance ...
The Move to the Cloud Gains Momentum, but Security is Still a Big Concern
More organizations are moving applications and data to the cloud, driven in part by changing ...
Eight in 10 IT Pros Believe Their Organization Is Next to Suffer a Breach
94% of IT pros have experienced a data breach at some point in time 79% are worried their ...
Companies Should Tell Workers It’s OK to Confess to Security Mistakes, Stanford Professor Says
88% of data breaches are caused by human error Employees between the ages of 18 and 30 are ...
IT Leaders Grossly Overestimate the Maturity of Their Vulnerability Management Programs
84% of companies say their vulnerability management is efficient Researchers find a ...
A Third of Companies Expose Unsafe Network Services to the Internet, Research Reveals
Data storage, remote access and network administration are most prevalent services exposing ...
76% of Security Pros Admit Securing Their Cloud Environments Is a Struggle
Most security professionals have difficulty maintaining security configurations in the cloud ...
BEC Attack Payments Are on the Rise, Report Finds
Criminals look for higher BEC payments Gift card frauds are the most common BEC incidents ...
Global Cybercrime Will Cost Businesses $11.4 Million Per Minute by 2021
Cybercrime will cost more than $11 million per minute globally by 2021 Organizations spend ...
61% of Companies Have Suffered an Insider Attack in the Past Year
50% of businesses find it harder to detect insider threats after migrating to the cloud ...
Meeting Customer Security Needs along Their Security Maturity Journey
Security is not only a technology problem. It’s also a people problem The impact in mean ...


