Security Pros Don’t Protect Keys and Certificates as Effectively as Usernames and Passwords
A study comparing security controls for human and machine identities reveals a worrying ...
Data security, privacy are big hurdles in front of successful digital transformation
Healthcare organizations are doing everything they can to modernize and digitally transform ...
60% of Records Leaked in Past Year Exposed by Financial Services Firms
Financial services firms accounted for 6% of all data breaches in 2019 but more than 60% of ...
CISOs Are Skeptical About Cybersecurity Vendor Claims, Study Shows
Most Enterprise IT pros believe cybersecurity vendors use ambiguous data, and sometimes even ...
Healthcare Security: How To Deploy IoT Securely
The healthcare internet of things (IoT) market is expected to reach 543 billion by 2025 — at ...
Seven Toxic Information Security Personalities
There are many challenges to getting a cybersecurity program right. The right technology ...
The Four Best Cybersecurity Resolutions for Small Businesses in 2020
“In 2019, 43% of breach victims were small businesses.” (Verizon) The New Year should not ...
A Perfect AV-Comparatives Detection score: What does it mean?
With an ever-changing Cybersecurity Industry and a growing number or security solutions, it ...
Seven in 10 Breaches Are Caused by Insiders, New Study Shows
Accidental internal breaches pose a growing security risk, with over 70% of companies ...
Glupteba Trojan Makes a Comeback Taking Aim at Large Enterprises [Whitepaper]
For an attacker, using a known piece of malware carries both advantages and disadvantages. ...
For Cloud-native App Security, Few Companies Have Embraced DevSecOps
A recent study identified some startling news when it comes to the state of security and ...


