Securing the Human Layer – The First Sane Step Towards Achieving a Strong Cybersecurity Posture
Employees typically access 59 risky URLs per week, or 8.5 per day, according to new data. ...
92% of Businesses Give Criminals Access to Customer Data through Vulnerable JavaScript Integrations
Sensitive data, like personally identifiable information (PII) and credit card information, ...
Report Says Data in the Cloud is Creating ‘Fear and Trust’ Issues for Security Professionals
A patchwork of tools, the presence of misconfigured services, and confusion around data ...
Media Is the Most Targeted Industry in Credential Stuffing Attacks
The media industry is a prime target for credential stuffing attacks, with more than 17 ...
Email Impersonation on the Rise as Workforce Grows Increasingly Distracted and Dispersed
Over a third of organizations are seeing email-based attacks hit their inbox daily, new data ...
HVI Blocks SIGRed, Prevents Zero-Day Execution from Suspicious Memory Regions
Windows DNS server remote code execution vulnerability permits full takeover of infected ...
MDR Creates New Revenue Opportunities for Managed Services Providers
Managed Detection and Response is one of the fastest growing areas of cybersecurity with a ...
SOC Employees Continue to Battle Stress and Skill Shortages, Study Finds
Security operations center (SOC) performance is getting worse, and the human element ...
Researchers Reveal the Countries Most Targeted by Cyberattacks
A study using data from the Center for Strategic and International Studies (CSIS) looked at ...
Most Companies Now Accept BYOD Policies But 30% Don’t Use Endpoint Protection for Those Devices
Bring your own device (BYOD) policies are changing around the world, and the latest report ...
One in 2 Companies Unable to Cope with Remote Work Security Risks
Half of infosec professionals in a recent Bitdefender study revealed that their organization ...
The Key Reason Why Some Enterprises Outright Refuse to Enable BYOD
Most IT professionals say employees are allowed to use personal devices for work. And while ...


