Organizations struggle with patching endpoints against critical vulnerabilities
Less than 50 percent of organizations can patch vulnerable systems swiftly enough to protect against critical threats and zero-day attacks, and 81 percent have suffered at …
Cloud + BYOD + IoT = major security gaps
Despite having hundreds of tools at their disposal, IT and security teams are rapidly losing sight of their asset landscape. That’s the finding from a survey from Axonius, …
BYOD security challenges leave companies at risk
Organizations aren’t moving quickly enough on cybersecurity threats linked to the drive toward using personal mobile devices in the workplace, warns a QUT privacy …
Security holding back employers from meeting employees’ remote working expectations
Less than a third (32%) of UK workers are allowed to work remotely whenever they want, according to research from Capita which uncovers employee attitudes to remote/flexible …
The highly competitive global encryption management solutions market continues to grow
The increasing adoption of digitalization and globalization of enterprises have made IT resources prone to cyber attacks. This has increased the demand for encryption …
How mobile use cases in financial services are affecting security
Financial services organizations are increasingly exposed to cyber threats, according to Wandera. The report “Mobile Security in the Financial Services,” includes analysis …
Protect privacy and provide secure mobile access to corporate data
In this Help Net Security podcast, Mike Campin, VP of Engineering at Wandera, talks about how their solution solves a problem that every business is facing today, which is how …
How privileged insiders threaten the security of global organizations
A new global survey from BeyondTrust explores the visibility, control, and management that IT organizations in the U.S., APAC, Europe and the Middle East have over employees, …
What is shadow mining and why is it a security threat?
The majority of organizations are overlooking the threat of shadow mining, with 65 percent of organizations unfamiliar with the term and more than half (57 percent) unfamiliar …
How can healthcare organizations remedy their cybersecurity ailments?
Cybersecurity is a constant concern for healthcare organizations, and the previous 12 months have done little to quell anxieties. In 2017, the Department of Health and Human …
Prevent shadow IT: Companies need security covering multiple communication vectors
There is a critical need for companies to adopt comprehensive and secure enterprise communications platforms to prevent shadow IT. It is a phenomenon where employees, to …
The state of BYOD and mobile device security
Bitglass has released its 2018 BYOD Security Report. The analysis is based on a survey of nearly 400 enterprise IT experts who revealed the state of BYOD and mobile device …
Featured news
Sponsored
Don't miss
- Google fixes Chrome zero-day with in-the-wild exploit (CVE-2024-4671)
- May 2024 Patch Tuesday forecast: A reminder of recent threats and impact
- How secure is the “Password Protection” on your files and drives?
- F5 fixes BIG-IP Next Central Manager flaws with public PoCs (CVE-2024-21793, CVE-2024-26026)
- Zscaler swats claims of a significant breach