Filip Truta
Recent Posts
CISOs Who Close Critical Skills Gaps Stand the Best Chance of Minimizing the Impact of Cyberattacks
CISOs who reduce or close their critical IT departments’ skills gaps have the highest ...
Poor Privacy Practices Sharply Boost Likelihood of a Data Breach, Study Shows
Companies that don’t change their perception about data protection are increasing their odds ...
Securing the Human Layer – The First Sane Step Towards Achieving a Strong Cybersecurity Posture
Employees typically access 59 risky URLs per week, or 8.5 per day, according to new data. ...
92% of Businesses Give Criminals Access to Customer Data through Vulnerable JavaScript Integrations
Sensitive data, like personally identifiable information (PII) and credit card information, ...
Email Impersonation on the Rise as Workforce Grows Increasingly Distracted and Dispersed
Over a third of organizations are seeing email-based attacks hit their inbox daily, new data ...
One in 2 Companies Unable to Cope with Remote Work Security Risks
Half of infosec professionals in a recent Bitdefender study revealed that their organization ...
The Key Reason Why Some Enterprises Outright Refuse to Enable BYOD
Most IT professionals say employees are allowed to use personal devices for work. And while ...
Businesses Now Spend a Third of Their Cybersecurity Budget on SOC
Organizations with a dedicated security operations center (SOC) know how much it helps ...
Remote Workers Encounter 8 Risky URLs per Day, New Research Shows
Given enough time, employees – especially those working remotely – will click on a link to a ...
Business Email Compromise (BEC) Attacks Jump 200 Percent from April to May
New data shows a sharp increase in monthly business email compromise (BEC) attacks focused ...
World Economic Forum Outlines Core Principles for Businesses Seeking to Reduce Cyber Risk
An optimistic new report by the World Economic Forum predicts businesses will prioritize ...
IT Departments May Be Helping Bad Actors with New Apps for Untrained Staff, New Research Shows
Rapid changes to how businesses operate offer excellent opportunities for malicious actors ...