Please turn on your JavaScript for this page to function normally.
tools
A proactive approach to cybersecurity requires the right tools, not more tools

The key challenge facing security leaders and putting their organizations at risk of breach is misplaced confidence that the abundance of technology investments they have made …

healthcare
How organizations view and manage cyber risk

Amid a wider range of issues to handle, a majority of board members and senior executives responsible for their organization’s cyber risk management had less than a day in the …

Facepalm
Only 15% of organizations can recover from a severe data loss within an hour

There’s a global concern about the business impact and risk from rampant and unrestricted data growth, StorageCraft research reveals. It also shows that the IT …

fire
Threat visibility is imperative, but it’s even more essential to act

Cyberthreats are escalating faster than many organizations can identify, block and mitigate them. Visibility into the expanding threat landscape is imperative, but according …

secure
SMBs show no improvement in IT maturity levels, security remains top concern

IT groups at small and midsize businesses (SMBs) show no improvement in IT maturity levels in three years, while security remains top concern, a Kaseya survey reveals. Based …

privacy
Should social media organizations be subject to strict privacy regulation?

80% of IT security professionals agree that more security and privacy legislation is needed, especially for social media organizations that store personal data. However, …

arrow
Supply chain security: Five IT strategies for choosing vendors wisely

With the proliferation of SaaS solutions, API integrations and cloud computing, virtually everything in the modern enterprise is connected to untold number of outside …

idea
CISO priorities: Implementing security from the get-go

Dr. David Brumley, CEO of ForAllSecure, a Carnegie Mellon computer science professor (on leave), and part of the team that won the DARPA Cyber Grand Challenge, was, at one …

dislike
Attackers use large-scale bots to launch attacks on social media platforms

Social media sites have become lucrative targets for criminals looking for quick monetization. More than half of logins (53%) on social media sites are fraudulent and 25% of …

network
Thinking network-first to protect against security threats

The challenge of securing data has seen a dramatic shift in complexity in recent years due to an increasing number of threats frequently appearing. However, this complexity …

Arrows
A point-in-time approach to risk management is no longer effective

Among organizations that engage third parties to provide business services, 83% identified third-party risks after conducting due diligence and before recertification, …

user
Extending security to fourth parties your business needs, but doesn’t control

While there is much discussion about the data security and privacy risks created by third parties, another source of risk can be significant but overlooked: that from fourth …

Don't miss

Cybersecurity news