Please turn on your JavaScript for this page to function normally.
chess
Why security strategies need a new perspective

After a stream of ransomware campaigns, data leaks, and attacks on critical infrastructure, businesses understand their digitization strategy needs to be complemented by a …

bomb
Highly Evasive Adaptive Threats (HEAT) bypassing traditional security defenses

Menlo Security announced it has identified a surge in cyberthreats, termed Highly Evasive Adaptive Threats (HEAT), that bypass traditional security defenses. HEAT attacks are …

person
Enterprise data safety during the Great Resignation

71% of IT leaders have said that the ‘Great Resignation’ has increased security risks in their organizations, according to a survey of 2,000 employees in UK and US businesses, …

Contextualizing supply chain risks in a SaaS environment

In the wake of the SolarWinds and Kaseya attacks, third-party cybersecurity risks remain top of mind for security leaders. Nonetheless, CISOs continue to experience …

bomb
Ransomware groups and APT actors laser-focused on financial services

Trellix released a report, examining cybercriminal behavior and activity related to cyber threats in the third quarter (Q3) of 2021. Among its findings, the research reports …

laptop
Most breaches largely caused by staff working from home

Diligent announces a survey of 450 senior finance and risk professionals in UK-listed businesses. The results show that UK businesses lost £374 million in 2021, largely due to …

Pirate flag
Piracy is alive and well, demand reaching 3.7 billion unlicensed streams and downloads

Akamai released a research detailing the persistence of online piracy. The evolving piracy landscape, according to the U.S. Chamber of Commerce’s Global Innovation …

Malcolm Harkins
How to measure security efforts and have your ideas approved

In this interview with Help Net Security, Malcolm Harkins, Chief Security & Trust Officer, Epiphany Systems, talks about the challenges security leaders must face when …

cybersecurity jobs
Cybersecurity staff turnover and burnout: How worried should organizations be?

The heightened risk of cyberattacks on businesses is being compounded by significant recruitment and retention issues within cybersecurity teams, making businesses more …

hole
How costly is an insider threat?

Proofpoint released a report to identify the costs and trends associated with negligent, compromised, and malicious insiders. Notably, on average, impacted organizations spent …

medical devices
53% of medical devices have a known critical vulnerability

After a year of unprecedented ransomware attacks on hospitals and healthcare systems – and with healthcare now the #1 target for cybercriminals – critical medical device risks …

risk
Cyber risks top worldwide business concerns in 2022

Cyber perils are the biggest concern for companies globally in 2022, according to the Allianz Risk Barometer. The threat of ransomware attacks, data breaches or major IT …

Don't miss

Cybersecurity news