Jan 03, 2020

Pair of Data Breaches Top Off the Year in Healthcare Security

Canada-based LifeLabs notified 15 million patients on December 17 that their personal ...

Dec 30, 2019

Half of CISOs Might Quit Their Jobs in 2020 if Budgets, Cybersecurity Staff Remain Tight [Bitdefender Study]

Organizational weak spots and stressors are taking their toll on IT security professionals. ...

Dec 27, 2019

Security Pros Don’t Protect Keys and Certificates as Effectively as Usernames and Passwords

A study comparing security controls for human and machine identities reveals a worrying ...

Dec 26, 2019

Data security, privacy are big hurdles in front of successful digital transformation

Healthcare organizations are doing everything they can to modernize and digitally transform ...

Dec 24, 2019

60% of Records Leaked in Past Year Exposed by Financial Services Firms

Financial services firms accounted for 6% of all data breaches in 2019 but more than 60% of ...

Dec 23, 2019

CISOs Are Skeptical About Cybersecurity Vendor Claims, Study Shows

Most Enterprise IT pros believe cybersecurity vendors use ambiguous data, and sometimes even ...

Dec 20, 2019

Healthcare Security: How To Deploy IoT Securely

The healthcare internet of things (IoT) market is expected to reach 543 billion by 2025 — at ...

Dec 19, 2019

Seven Toxic Information Security Personalities

There are many challenges to getting a cybersecurity program right. The right technology ...

Dec 18, 2019

The Four Best Cybersecurity Resolutions for Small Businesses in 2020

“In 2019, 43% of breach victims were small businesses.” (Verizon) The New Year should not ...

Dec 18, 2019

A Perfect AV-Comparatives Detection score: What does it mean?

With an ever-changing Cybersecurity Industry and a growing number or security solutions, it ...

Dec 17, 2019

Seven in 10 Breaches Are Caused by Insiders, New Study Shows

Accidental internal breaches pose a growing security risk, with over 70% of companies ...

Dec 16, 2019

Glupteba Trojan Makes a Comeback Taking Aim at Large Enterprises [Whitepaper]

For an attacker, using a known piece of malware carries both advantages and disadvantages. ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW