cybersecurity
Where does the SME fit into a supply chain attack?
“No business is an island, entire of itself” (with apologies to John Donne). Businesses have connections to other businesses, who supply them with goods, and whom they supply …
Trending cybercrimes and the big impact of lesser-known breaches
Sontiq released the Mid-Year 2021 Cybercrime Report, which highlights five key trends and the 2021 data breaches that pose the highest level of risk to victims. Companies are …
Exposing the latest cloud threats affecting enterprises
Netskope revealed new research showing the continued growth of malware delivered by cloud applications and also the potential for critical data exfiltration tied to employees …
Consumers are increasingly concerned about online security and imminent attacks
According to a new Sophos Home survey, forty-five percent of consumers say they’re more at risk of being hit by an attack now than they were before the pandemic, and 61% …
36% of organizations suffered a serious cloud security data leak or a breach in the past year
As cloud adoption accelerates and the scale of cloud environments grows, engineering and security teams say that risks—and the costs of addressing them—are increasing. The …
CISOs operating blind, with limited visibility and control
An overwhelming percentage (75%) of CISOs consider their organization to be at greater risk of a cybersecurity attack due to the transition to home working, with a third …
Consumer attitudes towards various digital identity authentication methods
With concerns around online fraud and identity theft rising, consumers expect businesses to utilize new technologies to protect them online. According to research from …
Verifiable credentials are key to the future of online privacy
To realize the full potential of online services, identity verification solutions are required to avoid fraud and boost trust in the systems, for both end users and …
Ignore API security at your peril
Application programming interfaces (APIs) are at the core of nearly every digital experience – whether that is the delivery of mobile apps that enable consumers to …
The knowledge gap around runtime security and the associated risks
According to Aqua Security’s 2021 Cloud Native Security Practitioner study, only 3% recognize that a container, in and of itself, is not a security boundary, indicating …
Top consumer cybersecurity insights and takeaways from April to June 2021
NortonLifeLock’s global research team Norton Labs published its second quarterly Consumer Cyber Safety Pulse Report, detailing the top consumer cybersecurity insights and …
40% fell victim to a phishing attack in the past month
The global shift to remote work has exacerbated the onslaught, sophistication, and impact of phishing attacks, according to Ivanti. Nearly three-quarters (74%) of respondents …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity