A study using data from the Center for Strategic and International Studies (CSIS) looked at how cyberattacks are distributed across the globe and the most common techniques used in cyberattacks.
All about Virtualization and Cloud Security | Recent Articles:
Bring your own device (BYOD) policies are changing around the world, and the latest report by Bitglass shows that companies are now much more permissive in this regard, although the shift is likely caused by necessity and not choice.
The United States Secret Service issued an advisory warning of an increase in cyberattacks against managed service providers (MSP) in an effort to compromise companies using their services.
Most Chief Information Officers (CIO) are worried about the security risks associated with the proliferation of TLS machine identities, which is aggravated by the fact that many of them don’t have an accurate account of the number of certificates deployed in their infrastructure.
A scan of the Japanese Internet infrastructure showed how many devices could be compromised with common user names and passwords, and ISPs helped the authorities make that determination. But ISPs also seemed to lack the tools to make those determinations by themselves, in a way that secures their networks and customers at the same time.
The Cybersecurity Security and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued an advisory for companies regarding the detection and mitigation of malicious traffic coming from Tor (The Onion Router.)
DDoS attacks are on the rise at a time of the year that's usually a lot less uneventful, according to a report from Nexusguard that reveals a 278% increase in DDoS attacks compared to Q1 2019.
A survey of some of the top IT security professionals who participated in the annual Black Hat USA conference underlined a key concern, with companies overwhelmingly believing that the COVID-19 pandemic increases cyberthreats.
The Internet of Things (IoT) ecosystems may be populated by all the latest and innovative devices, but it's also home to legacy devices, which in many cases, are points of entry for adept hackers looking for a way into the infrastructure.
The self-assessed effectiveness of corporate security operations centers (SOCs) seems to be overestimated by the people working in those positions, a new study from Exabeam revealed.
Most people are confident they can keep personal identifiable information (PII) secure while working from home. That comes in stark contrast with the fact that more than 50% use their laptops for work, according to a study from IBM Security and Morning Consult.
Most small and medium enterprises (SMEs) are planning to increase their cyber-insurance spending in the next couple of years, according to a new industry report.