cybersecurity

Protecting your organizations against BEC and other email attacks
No matter who you talk to or work with, they probably use email as a primary means of communication. Most of us spend about 5 hours a day checking email, sometimes refreshing …

Industrial facilities progressively at risk of data theft and ransomware attacks
Trend Micro released a new report highlighting the growing risk of downtime and sensitive data theft from ransomware attacks aimed at industrial facilities. “Industrial …

Secure AI is the foundation of trustworthy AI
AI-based recommendation systems are used in many online services we enjoy today, including search engines, online shopping sites, streaming services, and social media. …

XDR: Security’s new frontier
As enterprises transform their IT environment and workforce, finding the right security approach is critical for success. Without the proper protective measures in place, …

Threat modeling needs a reset
Organizations need to rethink their approach to threat modeling or risk losing its value as a key defense in their cybersecurity arsenals. The traditional approaches to threat …

Chief Compliance Officers must embrace new leadership responsibilities
As demands on the compliance function grow more intense, Chief Compliance Officers (CCOs) must proactively embrace new leadership responsibilities for their role and …

Major threats to cloud infrastructure security include a lack of visibility and inadequate IAM
98% of companies had experienced at least one cloud data breach in the past 18 months compared to 79% last year, according to an IDC survey. Meanwhile, 67% reported three or …

An organization’s security posture will benefit from increased coordination
NAVEX Global released key findings from its survey of IT security professionals in the U.S. and U.K. on the collaboration between the IT and risk management functions. …

SMBs willing to spend more money to protect their data
Cybersecurity remains a top priority for SMBs worldwide, as revealed in a survey conducted by Vanson Bourne. The report found that organizations are challenged to find a MSP …

How to conquer synthetic identity fraud
“No single organization can stop synthetic identity fraud on its own,” reports The Federal Reserve. “Fraudster tactics continually evolve to stay a step ahead of detection—and …

Unstructured data still overshared inside and outside organizations
The number of overshared files rose 450 percent compared to the same quarter in 2020, highlighting the significant impact of the pandemic and remote work on data security. …

Researchers design new techniques to bolster computer security
Because corporations and governments rely on computers and the internet to run everything from the electric grid, healthcare, and water systems, computer security is extremely …
Featured news
Resources
Don't miss
- Fake macOS help sites push Shamos infostealer via ClickFix technique
- Why a new AI tool could change how we test insider threat defenses
- Why satellite cybersecurity threats matter to everyone
- Kopia: Open-source encrypted backup tool for Windows, macOS, Linux
- Review: Adversarial AI Attacks, Mitigations, and Defense Strategies