Data breaches, a rare occurrence not too long ago, have become the norm, forcing enterprises worldwide to adopt a paranoid posture with regards to the likelihood of disruption and loss of business.
All about Virtualization and Cloud Security | Recent Articles:
Faced with a growing army of cyber criminals constantly after their data, businesses are investing heavily in new technology and professionals to close the cybersecurity gap. While this sounds promising, most organizations are making very slow progress towards cyber resilience.
Cybercriminals exposed 2.8 billion consumer data records in 2018, costing U.S. organizations over $654 billion. Healthcare, financial services and government were the sectors hardest hit by cyberattacks, new research shows.
Too many CISOs are under constant pressure to defend their organization from cyber threats. They are feeling unsupported, and it’s taking a toll on their mental health, according to a new study.
Almost a quarter of Chief Information Security Officers (CISOs) in the finance sector have drawn up plans to compel their Chief Financial Officer (CFO) to spend extra dollars on their organization’s cybersecurity posture, according to a new study.
The government of the US city of Baltimore is seeking federal dollars to recover from a devastating ransomware attack that allegedly leveraged the NSA-developed EternalBlue exploit.
One year in, there are still conflicting sentiments from the global workforce regarding the EU General Data Protection Regulation – specifically, whether the regulation has been effective.
Ransomware drains billions from the global economy each year and shows no signs of slowing down. However, the highest cost of a ransomware attack is no longer the ransom itself. Today, the bulk of the financial damage consists of downtime, tarnished reputations and regulatory fines.
New research shows that despite increasing fears around cyber threats, companies in the US and the UK are behind in implementing best practices and technology to lock down and protect passwords.
The very bodies that should set an example in protecting sensitive data are the same ones that are failing to comply with existing standards, new research indicates.
User and service accounts that are inactive and enabled (“ghost users”) are prime targets for penetration and lateral movement, researchers say. But adversaries also have a different breed of user accounts in their crosshairs: accounts with non-expiring passwords.
Most cybersecurity roles are still filled by men and pay disparity is still an issue. However, women now account for 24% of the cybersecurity workforce and are more likely to be promoted to senior positions than men.