cyber risk

How tech pros perceive the evolving state of risk in the business environment
SolarWinds released a report which examines how technology professionals perceive their organizations’ risk management and mitigation readiness after a year of rapid …

How to prevent corporate credentials ending up on the dark web
A little over $3,000 — that’s how much stolen corporate network credentials tend to go for on the dark web. Although the exact asking price for an individual’s …

Turning the tide on surging account takeovers in the media industry
Account takeovers (ATOs) are on the rise, fueled by the widespread use of automated bots. The media industry, which includes social networks, content streaming, gambling, …

Government IT decision makers worried about security risks related to cloud migration
Nearly 70% of U.S. government IT decision makers surveyed view security risks as the top barrier when migrating to modern cloud platforms, a Morning Consult survey reveals. Of …

Questions that help CISOs and boards have each other’s back
Boards of directors and executives seem increasingly interested in understanding their companies’ security posture. And why wouldn’t they be? The ransomware threat posed by …

Asset inventory management: What’s the ROI?
Asset inventory management is critical to any company’s planning and accounting process. Having an accurate, up-to-date view of every asset (all devices, equipment, vehicles, …

Most companies still rely on manual tools and tech for internal audit processes
Despite volatility of the risk landscape in the wake of the COVID-19 pandemic, most organizations still rely on manual tools and technologies for internal audit processes, a …

Most financial services mobile apps still rely on passwords, even with added friction
Incognia announced a report which highlights results from their most recent study focusing on authentication and friction at login and the password reset process. The study …

Vaccinate your data: Addressing and adapting to new data risks
It seems like only yesterday that we were all reading up on what the implementation of the European Union’s General Data Protection Regulation (GDPR) would mean for businesses …

Protect your smartphone from radio-based attacks
By now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone …

Application security tools ineffective against new and growing threats
A study by Fastly and ESG, based on insights from information security and IT professionals representing hundreds of organizations globally, revealed growing concerns around …

57% of reported incidents are caused by insiders
Insider data breaches were the top cause of data and cybersecurity incidents reported in the first quarter of 2021, according to the ICO. 57% of reported incidents were caused …
Featured news
Resources
Don't miss
- How military leadership prepares veterans for cybersecurity success
- Fighting fraud with AI: The new identity security playbook
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)