cybersecurity

Cybersecurity awareness is too often a part-time effort
SANS announced the release of a report which analyzes the data of over 1,500 security awareness professionals from around the world to benchmark how organizations are managing …

CSAE: Guiding principles and best practices for data scientific investigations of organized crime
A white paper published by REPHRAIN, in collaboration with the Dutch National Police, offers a solution to big data problems that tend to hamper police probes into this type …

Tackling cross-site request forgery (CSRF) on company websites
Everyone with half a mind for security will tell you not to click on links in emails, but few people can explain exactly why you shouldn’t do that (they will usually offer a …

Why DDI technology is fundamental for multicloud success
Whether they are handling new applications or managing workloads, cloud and multicloud technologies are critical components of the modern workplace. But the real value of …

Only 14% of domains worldwide truly protected from spoofing with DMARC enforcement
While the DMARC enforcement rate increases, 3 billion messages per day are still spoofing the sender’s identity, Valimail reveals. Email continues to be an effective way to …

80% of security leaders would like more control over their API security
There are major gaps in API security based on insights from over 100 senior security leaders at large enterprises in the United States and Europe, an Imvision report reveals. …

Data breaches and network outages: A real and growing cost for the healthcare industry
One year into the COVID-19 pandemic, the Infoblox report reveals major challenges the healthcare industry faced as IT workers scrambled to secure protected health information …

How to stay ahead of the rise of synthetic fraud
While banks have been successful in reducing card fraud in recent years, a new and rising threat has emerged: synthetic identity fraud. By combining real and falsified …

Cybercriminals capitalizing on our reliance on the cloud
90% of cyberattacks on cloud environments in the last 12 months involved compromised privileged credentials, according to a research from Centrify. Most cloud environments …

Rapid increase in security tools causing alert fatigue and burn out
On average, enterprises maintain 19 different security tools, with only 22% of such tools serving as vital to primary security objectives, a ReliaQuest survey reveals. The …

Compliance department spending plateaued in 2020
A study of 117 organizations in the second half of 2020 showed that compliance department spending was projected to plateau in 2020 after several years of rapid growth, …

Data protection challenges hinder digital transformation initiatives
Data protection challenges are undermining organizations’ abilities to execute digital transformation (DX) initiatives globally, according to the Veeam report, which has found …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025