Please turn on your JavaScript for this page to function normally.
network
Cybersecurity industry analysis: Another recurring vulnerability we must correct

I have spent my career finding, fixing, discussing, and breaking down software vulnerabilities, one way or another. I know that when it comes to some common security bugs, …

endpoint protection
Endpoint complexities leaving sensitive data at risk

Absolute Software announced key findings from its report which shines a light on key trends affecting enterprise data and device security, and underscores the dangers of …

lock
Organizations have seen an increase in device encryption

32% of organizations have seen an increase in device encryption in the past year, according to a Vanson Bourne survey. Additionally, 31 percent noted that their organization …

cloud
SeKVM: Securing virtual machines in the cloud

Whenever you buy something on Amazon, your customer data is automatically updated and stored on thousands of virtual machines in the cloud. For businesses like Amazon, …

lock
How businesses can protect their brands and bottom lines against damage from illegal robocalls

March 17, 2021 was a milestone in the war on illegal robocalls. The FCC levied a $225 million fine — the largest in its history — on a telemarketer for making 1 billion …

identity theft
Identity crime victims struggling with financial, emotional and physical impacts

Nearly 30 percent of people who contact the Identity Theft Resource Center (ITRC) are victims of more than one identity crime. Their latest study covers the 36 months from …

ransomware
The state of enterprise preparedness for ransomware attacks

In the aftermath of the Colonial Pipeline attack, ISACA polled more than 1,200 members in the United States and found that 84 percent of respondents believe ransomware attacks …

Broken glass
Enterprise networks vulnerable to 20-year-old exploits

Popular preconceptions of enterprise security and network usage are often inaccurate, according to Cato Networks. While exotic attacks and nation-states such as Russia and …

idea
Cybersecurity leaders lacking basic cyber hygiene

Constella Intelligence released the results of a survey that unlocks the behaviors and tendencies that characterize how vigilant organizations’ leaders are when it comes to …

brain
How do we decide whether or not to trust AI systems?

Every time you speak to a virtual assistant on your smartphone, you are talking to an artificial intelligence — an AI that can, for example, learn your taste in music and make …

code
A leadership guide for mitigating security risks with low code platforms

The low code market continues to grow, increasingly finding adoption for more diverse and serious applications among enterprises and independent software vendors (ISVs). The …

money
Victims lose millions to healthcare related eCrime

Victim losses from healthcare related eCrime in the U.S. rose by 2,473 percent during 2020 as the COVID-19 pandemic swept through the nation and world, CrowdStrike reveals.   …

Don't miss

Cybersecurity news