Please turn on your JavaScript for this page to function normally.
account
Credential spill incidents nearly doubled since 2016

The number of annual credential spill incidents nearly doubled from 2016 to 2020, according to F5 research. There was a 46% downturn in the number of spilled credentials …

risk
People are often the collateral damage of attacks on corporations

Thanks to cyberattacks making regular headlines in the news, it’s no secret that massive data breaches are a significant threat to organizations. However, a report from …

users
Collaboration is the key to a secure world-class sporting event

Securing any world-class event is a massive undertaking that requires teams of security professionals to coordinate with each other and constantly share information. I’ve seen …

thief
The cost of synthetic fraud to reach new highs

A TransUnion research finds instances of synthetic fraud and outstanding balances for suspected synthetic accounts at U.S. financial institutions have declined significantly …

SecOps
COVID-19 impact on SecOps: Increased threats, greater investments in automation

Siemplify released a research that studies how the sudden shift to remote work during the COVID-19 pandemic has affected SecOps analysts’ ability to perform their jobs and the …

MITRE ATT&CK
Three ways MITRE ATT&CK can improve your organizational security

There’s a good reason everyone’s talking about MITRE ATT&CK: it’s an objective, third-party standard with which organizations can measure their own detection coverage, as …

Cybersecurity risk management
Organizations can no longer afford a reactive approach to risk management

Board members and C-suite executives around the globe are most concerned in 2021 with risks associated with COVID-19-related government policies and regulations, economic …

connected car
The transportation sector needs a standards-driven, industry-wide approach to cybersecurity

Despite the uncertainties of the last year, the transformation of the transportation sector forged ahead, dominated by the prevailing trend of CASE (Connected, Autonomous, …

data
Data loss prevention strategies for long-term remote teams

Before the recent pandemic, many executives began appreciating the risks and opportunities associated with cybersecurity. A 2019 survey on cybersecurity priorities from Optiv …

Terminal
Enterprises average one root access orphan key on every enterprise server

SSH machine identities are critical to digital transformation strategies, as they authenticate privileged access between machines and are ubiquitous across enterprise …

NIST
NIST provides guidance to protect controlled unclassified information

Nations around the world are adding cyberwarfare to their arsenal, employing highly skilled teams to launch attacks against other countries. These adversaries are also called …

tracking
Lack of visibility into remote endpoints leaves companies vulnerable to ransomware

Illumio released findings on visibility and security practices for remote endpoints, revealing how vulnerable organizations are to ransomware propagating throughout the …

Don't miss

Cybersecurity news