US Government Institutions Become Hot Target for Ransomware Operators in 2019
Ransomware operators have developed a taste for state and local governments across the ...
Top Inherent Risks with Cloud Security
The Cloud Security Alliance (CSA), an organization dedicated to defining standards, ...
Moving to the Cloud? Be Ready to Embrace Complexity
The Cloud Security Alliance (CSA), an organization that works to raise awareness about best ...
Every Hour SOCs Run, 15 Minutes Are Wasted on False Positives
New research out in the past few weeks show that false positives and alert fatigue continue ...
The Top Reason Businesses Make a Cyber Insurance Claim - Business Email Compromise
AIG, one of the largest insurance companies in the world, has issued a report which reveals ...
Financial Services: State of Software Security
As we’ve recently covered, cybersecurity in financial services is having a challenging time ...
The changing of the guard in the 2019 Gartner EPP MQ and why Bitdefender moved up
Gartner has once again included Bitdefender in the 2019 Magic Quadrant for Endpoint ...
The Cloud Security Alliance’s Top Threats to Cloud Computing
Periodically the Cloud Security Alliance publishes a report of the top threats to cloud ...
How to Prepare for Data Breach Notifications under GDPR
The Ireland-based Data Protection Commission (DPC), the supervisory authority for the ...
GAO: US Federal Agencies Need to Fully Establish Risk Management Programs
There have been plenty — too many — breaches involving federal agencies over the years. Way ...
When it Comes to Application Security, Banks Pay Little Interest
One might think financial institutions, such as banks, would have formidable levels of ...
How to Manage the Headache of Defending Industrial IT Infrastructures (Industrial IoT) – Part 2
This is the second of a two-part series of blog posts covering the challenges of securing ...


