cyber risk

An organization’s security posture will benefit from increased coordination
NAVEX Global released key findings from its survey of IT security professionals in the U.S. and U.K. on the collaboration between the IT and risk management functions. …

Unstructured data still overshared inside and outside organizations
The number of overshared files rose 450 percent compared to the same quarter in 2020, highlighting the significant impact of the pandemic and remote work on data security. …

Consumers neglecting mobile security despite growing number of threats
Over the past year, consumers have adapted to many changes, including the rapid shift towards a digital-first lifestyle. This has led to an emphasis on consumers dependence on …

Navigating the complexity of ransomware negotiations
Most ransomware attacks are opportunistic, and at the end of the day, cybercriminals do not discriminate. Nobody plans to fall victim, but the fact is any company with an …

USB threats could critically impact business operations
According to a report released by Honeywell, USB threats that can severely impact business operations increased significantly during a disruptive year when the usage of …

Many companies believe it is important to protect employee privacy, yet few are effective in doing so
DTEX Systems released a report which revealed a significant workforce privacy gap. The report, conducted by the Ponemon Institute, surveyed a global pool of 1,249 IT and IT …

Third-party identity risk management, compliance, or both?
Third-party risk management and compliance have traditionally gone hand-in-hand. One is a business requirement, the other a business necessity. So, which comes first? Or …

How SMBs are dealing with emerging threats
ECI Software Solutions released a report detailing the findings from a survey examining how SMBs are leveraging technology to respond to the various threats from the past year …

Most third-party libraries are never updated after being included in a codebase
79% percent of the time, third-party libraries are never updated by developers after being included in a codebase – despite the fact that more than two thirds of fixes …

What is the impact of remote work on security best practices?
Employees are now accessing resources from any device and from anywhere outside of their corporate domain, a JumpCloud survey reveals. The report details the impact of …

Only 7% of security leaders are reporting to the CEO
While 60% of organizations have experienced a cyberattack in the last two years and spend approximately $38 million on security activities, only 7% of security leaders are …

It’s time for companies to take a hard look at how they manage secrets
Leaked infrastructure secrets – code, credentials and keys – which are exposed accidentally or intentionally cost companies an average of $1.2 million in revenue …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!