Please turn on your JavaScript for this page to function normally.
vectors
A strong security posture starts with application dependency mapping

More and more organizations are turning to an agile DevOps culture as part of an ongoing digital transformation to their business, moving from monolithic application …

shark
A third of 2018’s vulnerabilities have public exploits, 50% can be exploited remotely

Over 22,000 new vulnerabilities were disclosed during 2018, according to Risk Based Security’s 2018 Year End Vulnerability QuickView Report. While approximately 33% of …

Akamai report
Fighting credential stuffing attacks is an uphill battle

Hackers directed credential abuse attempts at retail sites more than 10 billion times from May to December last year, making retail the most targeted segment studied, …

cloud
Cloud business initiatives accelerating faster than security teams’ ability to secure them

The speed of cloud business initiatives is hampering organizations’ ability to secure and manage hybrid environments, with security personnel often not included. The 2019 …

keys
Privileged credential abuse is involved in 74% of data breaches

Most IT decision makers are not prioritizing Privileged Access Management (PAM) practices and solutions, despite knowing privileged credential abuse is involved in almost …

Webauthn
How WebAuthn aims to solve the password problem

One of the most pervasive challenges in cybersecurity is the balancing act between protection and usability. Security measures have to prevent malicious actors from accessing …

money
Social media-enabled cybercrime is generating $3.25 billion a year

Social media-enabled cybercrime is generating at least $3.25B in global revenue annually, according to an extensive six-month academic study undertaken by Dr. Mike McGuire, …

puzzle
How to combat delivery ramifications after a data breach

Following Marriott’s data breach, FTC regulations required the hotel chain to reach out to its entire email list of customers, informing them of a potential leak of their …

analyze
CISO’s guide to an effective post-incident board report

A successful cyberattack is undoubtedly one of the most disruptive events an organization can experience. Whether it’s phishing, DDoS, ransomware or SQL injection, the …

shadow
Prevent shadow IT: Companies need security covering multiple communication vectors

There is a critical need for companies to adopt comprehensive and secure enterprise communications platforms to prevent shadow IT. It is a phenomenon where employees, to …

thief
Insights on modern adversaries and their tactics, techniques, and procedures

In today’s ever-evolving cyber landscape, speed is essential for effective cyber defense. CrowdStrike’s Global Threat Report reveals “breakout time” – the critical window …

bot
Machine learning fundamentals: What cybersecurity professionals need to know

In this Help Net Security podcast, Chris Morales, Head of Security Analytics at Vectra, talks about machine learning fundamentals, and illustrates what cybersecurity …

Don't miss

Cybersecurity news