cyber risk

What is the cost of an insider data breach?
As companies emerge from the pandemic, and 40% of employees are planning to switch jobs, corporate data is at risk. Files are being uploaded, shared, synced and emailed by …

Health insurers facing growing risk of customer data theft
The U.S. health insurance industry is facing growing risks from cybersecurity threats due to the increasingly sophisticated techniques used by cybercriminals amid the …

Three security lessons from a year of crisis
Crime thrives in a crisis, and the coronavirus was the largest collective emergency that the world has faced for decades. While there are more heroes than villains in the …

How health tech can secure patient data post-CURES Act
It’s the central conundrum at the heart of telehealth: How can patients gain access to their most vital medical records without putting privacy at risk? The question is not …

Critical infrastructure cyberattacks signaling the importance of prioritizing security
Armis released new data uncovering the lack of knowledge and general awareness of major cyberattacks on critical infrastructure and an understanding of security hygiene. The …

Online brands prioritizing speed over security
Consumers around the world fear that businesses are now compromising online security in their efforts to deliver seamless digital experiences. According to a research released …

What are the most common cybersecurity challenges SMEs face today?
Small and medium-sized enterprises (SMEs) are considered to be the backbone of Europe’s economy. 25 million SMEs are active in the EU, and employ more than 100 million …

Cyber insurance failing to live up to expectations
A RUSI paper finds that the contribution of the insurance sector to improving cyber security practice is ‘more limited than policymakers and businesses might hope’, and …

How mobile operators view security in the 5G era
There’s a major gap in security capability among mobile operators, which in many cases is not yet being filled by industry partnerships, Trend Micro reveals. In the 5G …

Industrial facilities progressively at risk of data theft and ransomware attacks
Trend Micro released a new report highlighting the growing risk of downtime and sensitive data theft from ransomware attacks aimed at industrial facilities. “Industrial …

Enhancing cloud security with a two-step cryptography technique
The central goal of cloud computing is to provide fast, easy-to-use computing and data storage services at a low cost. However, the cloud environment comes with data …

Secure AI is the foundation of trustworthy AI
AI-based recommendation systems are used in many online services we enjoy today, including search engines, online shopping sites, streaming services, and social media. …