Study Ranks Healthcare and Insurance as Worst Custodians of Personal Data

Phishing remains a key attack vector for bad actors to compromise not just individual user ...

Nov 28, 2018

Ransomware – A Growing Menace for Healthcare Providers

In May 2017, the WannaCry ransomware took copious amounts of data hostage and demanded hefty ...

Nov 27, 2018

The BYOD Paradox: Personal Devices Expose Businesses to Cyber-Risk, But Employees Don’t Want Bosses Controlling Their Gadgets

BYOD programs have had a mixed track record over the years. Some say they increase mobility, ...

Nov 26, 2018

Building a Multi-Cloud Strategy? Be Sure to Address the Security and Management Challenges

Many organizations today are adopting a multi-cloud strategy, using services from several ...

Lack of Political Leadership in UK Jeopardizes Cyber Security of Critical Sectors, Report Says

The lack of political leadership to face targeted attacks is contributing to the poor job ...

Nov 22, 2018

Not a New Technique in Operation Shaheen Attack

The advanced attack targeting Pakistan described by Cylance mentions an evasion technique ...

Microsoft’s Data Collection Approach Violates GDPR, Hefty Fine Awaits

EU data protection legislation aims to give users more control over their personal data, and ...

Nov 20, 2018

Lax Employee Cybersecurity Habits Pose Growing Danger to Businesses

Employees’ cybersecurity habits are bad and getting worse. New research illustrates a ...

Ransomware Threat Alarmingly High for SMBs as They Place Security on the Back Burner

Small and medium-sized businesses are still a top target for ransomware attacks, and the ...

Nov 16, 2018

Under attack! Should your company ever “hack back”?

The threat of cyber attacks targeting businesses, specifically those breaches orchestrated ...

Nov 15, 2018

A Single Data Breach Can Rob You of 78% of Your Customers, Study Indicates

More than three-quarters of consumers would completely abandon a brand online if they heard ...

Nov 14, 2018

Comparing the OWASP Top 10 to the Real-World Top 10

Enterprise software is drowning in vulnerabilities and even organizations highly motivated ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW