Please turn on your JavaScript for this page to function normally.
zero
Push past zero trust barriers to securely connect the distributed workforce

If the past year has taught us anything, it’s that trusting a device simply because it originates from inside a corporate network is not a good idea. If an endpoint is …

ransomware
61% of organizations impacted by ransomware in 2020

Enterprises faced unprecedented cybersecurity risk in 2020 from increasing attack volume, the pandemic-driven digital transformation of work, and generally deficient cyber …

keyboard
IT security teams deal with unique challenges fueled by a remote workforce

IT security teams faced unprecedented challenges last year fueled by dramatically expanded work-from-home (WFH) programs, increased BYOD policy adoptions, and rising internal …

Cybersecurity risk management
Cybersecurity only the tip of the iceberg for third-party risk management

Most companies are missing key risks at more than one stage of the vendor risk lifecycle, yet few are expanding their TPRM programs to address these risks, according to …

HNS QR code
Most users don’t know the capabilities and risks of QR codes

QR code usage continues to rise in popularity. In fact, 57% of respondents to a new Ivanti study claim to have noticed an increase in the usage of QR codes since mid-March …

Facebook
Facebook Messenger users targeted by a large-scale scam

A large-scale scam campaign targeting Facebook Messenger users all over the world has been detected by Group-IB. Digital Risk Protection (DRP) analysts have found evidence …

vulnerability
Even though critical, web application security is getting less attention

As organizations shifted focus to support remote work and business continuity amid the challenges of 2020, web application security suffered, according to an Invicti Security …

cloud binary
Improper cloud IAM leaving organizations at risk

There is an industry-wide cloud permissions gap crisis, leaving countless organizations at risk due to improper identity and access management (IAM), a CloudKnox Security …

money
Payment transaction volume using 3-D Secure protocol grows globally

RSA has published its latest quarterly fraud report, reinforcing the migration to more precise payment authentication methods and showing a notable spike in brand abuse …

security awareness
Five steps to get employees invested in security awareness training

Remote work has become a new normal for industries worldwide, which presents exciting opportunities but also has the potential to expose critical security weaknesses, since …

Mask
The parallels of pandemic response and IoT security

While adjusting to life under a pandemic, we’ve become familiar with a host of medical and safety terminology that either didn’t exist before or was of little interest to …

eGRC
The enterprise eGRC market is expected to grow

The enterprise governance, risk, and compliance (eGRC) market is expected to register a CAGR of 12.5% in the forecast period (2021 – 2026). Organizations operate in a …

Don't miss

Cybersecurity news