Over 60% of the Fortune 1000 had at least one public breach over the last decade. Things have improved in recent times, but not by much. Researchers now estimate that 40% of the firms on the list will suffer a cyber loss this year and every year after.
All about Virtualization and Cloud Security | Recent Articles:
Artificial Intelligence (AI) and Machine Learning (ML) offer considerable advantages for cybersecurity professionals, especially in the face of the technology talent gap that has left 45 percent of companies with an understaffed cybersecurity team.
More than half of IT professionals are extremely concerned about the security of corporate endpoints in the face of sophisticated attack vectors like ransomware, disruptionware, phishing and others.
The username/password combo is still the dominant method of authentication used to access business devices, apps and data. Conversely, the password is still the top attack vector for organizations of all sizes, new research shows.
More than half of healthcare vendors have suffered at least one breach of protected health data belonging to patients of the healthcare providers they serve, new research shows. On average, a breach exposes around 10,000 patient records and inflicts $2.75 million in damages.
Fewer than one in four city employees receive cyber training related to ransomware threats as budgets for managing cyberattacks have stagnated across U.S. state institutions.
Switzerland’s Reporting and Analysis Centre for Information Assurance (MELANI) has issued an urgent security notice addressing Swiss-based companies that have recently suffered cyber-attacks.
The Oil & Gas sector is investing aggressively in digital as the energy transition progresses and firms move to sustainable business models. That includes heavy investments in cybersecurity, an ongoing trend in an industry bent on protecting assets and reputations.
The Federal Bureau of Investigation has issued a private industry notification warning organizations across the U.S. that hackers are actively targeting their supply chain partners to compromise their systems.
Cyber threats lurk behind every corner, in every industry and geography. From run-off-the-mill crooks to sophisticated state-sponsored actors, cybercriminals take every opportunity to exploit weaknesses for quick cash, to exfiltrate data, or to simply disrupt operations, depending on their goal.
The US National Security Agency (NSA) has published an important document outlining the main classes of cloud vulnerabilities and the ways an organization can go about addressing them.
A Canadian insurance company that fell victim to ransomware last year has managed to obtain the decryptor from its aggressors, then went on to freeze their Bitcoin wallet using a clever trick.