Please turn on your JavaScript for this page to function normally.
ENISA
Supply chain attacks expected to multiply by 4 in 2021

Supply chain attacks have been a concern for cybersecurity experts for many years because the chain reaction triggered by one attack on a single supplier can compromise a …

DevOps
73% of healthcare organizations have now adopted DevOps

The last year was challenging for every business sector, and none more than healthcare which was under enormous pressure to provide care while changing the way many services …

SAP
SAP applications more vulnerable than users might think

Many application owners are unaware of how vulnerable their SAP applications may be, significantly increasing the risks to their core enterprise systems. This is the overall …

idea
How tech pros perceive the evolving state of risk in the business environment

SolarWinds released a report which examines how technology professionals perceive their organizations’ risk management and mitigation readiness after a year of rapid …

insider threat
How to prevent corporate credentials ending up on the dark web

A little over $3,000 — that’s how much stolen corporate network credentials tend to go for on the dark web. Although the exact asking price for an individual’s …

passwordless
Turning the tide on surging account takeovers in the media industry

Account takeovers (ATOs) are on the rise, fueled by the widespread use of automated bots. The media industry, which includes social networks, content streaming, gambling, …

cloud complexity
Government IT decision makers worried about security risks related to cloud migration

Nearly 70% of U.S. government IT decision makers surveyed view security risks as the top barrier when migrating to modern cloud platforms, a Morning Consult survey reveals. Of …

Questions that help CISOs and boards have each other’s back

Boards of directors and executives seem increasingly interested in understanding their companies’ security posture. And why wouldn’t they be? The ransomware threat posed by …

complex
Asset inventory management: What’s the ROI?

Asset inventory management is critical to any company’s planning and accounting process. Having an accurate, up-to-date view of every asset (all devices, equipment, vehicles, …

tools
Most companies still rely on manual tools and tech for internal audit processes

Despite volatility of the risk landscape in the wake of the COVID-19 pandemic, most organizations still rely on manual tools and technologies for internal audit processes, a …

mobile devices
Most financial services mobile apps still rely on passwords, even with added friction

Incognia announced a report which highlights results from their most recent study focusing on authentication and friction at login and the password reset process. The study …

syringe
Vaccinate your data: Addressing and adapting to new data risks

It seems like only yesterday that we were all reading up on what the implementation of the European Union’s General Data Protection Regulation (GDPR) would mean for businesses …

Don't miss

Cybersecurity news