Please turn on your JavaScript for this page to function normally.
cloud
Prioritizing security efforts is key to data security in the cloud

32% of healthcare organizations store a wide range of sensitive data in the cloud, including healthcare data and personally identifiable information (PII) of customers and …

mobile apps
How mobile use cases in financial services are affecting security

Financial services organizations are increasingly exposed to cyber threats, according to Wandera. The report “​Mobile Security in the Financial Services​,” includes analysis …

dual monitors
The pervasive use of second screens endangers corporate IT networks

Despite techies having argued for years that having a second computer screen is a great way to improve productivity in the workplace, a new study from Gigamon has revealed …

cloud complexity
Do cloud apps make you a target for cyber attacks?

Almost half (49%) of businesses believe cloud apps make them a target for cyber attacks, a Thales research reveals. Surveying 1,050 IT decision makers globally, Thales’ 2019 …

ship
U.S. Coast Guard shares cybersecurity best practices for commercial vessels

Spurred by a recent cyber incident they were called in to help resolve, the U.S. Coast Guard has detailed basic measures to improve vessels ‘cybersecurity. Basic cyber …

email
What can financial institutions do to improve email security?

Financial institutions are in a fully-fledged war against data breaches. And rightly so – the finance sector is a frequent target of ransomware, phishing, and other malicious …

industry
Cybersecurity should not be an afterthought within industrial environments

The basics of cyber security are still not being practized regularly and new cyber security risks are emerging as more and more untested technologies are integrated within the …

bot
Are humans ready for AI to take control of digital security?

Just over a quarter (26%) of people in EMEA would prefer their cybersecurity to be managed by AI rather than a human, an online study conducted by Palo Alto Networks and …

patch
July Patch Tuesday forecast: Rules are changing for companies with custom applications

Every month I discuss the regular patches released for operating system or applications, but today I want to focus on some of the development components that are often …

identity
Why identity is the foundation of security

Once upon a time, companies secured their valuable information by locking file cabinets and installing passwords and firewalls around databases and systems in office-based …

businessman
Experts weigh in on salient issues around emerging threats and security tech

RSA Conference unveiled expert insights into salient issues around emerging threats and security technologies. Based on industry observations and interactions with partners …

Face
Insider attacks still far more difficult to detect and prevent than external cyber attacks

A recent survey conducted by Gurucul of more than 320 IT security experts, found that 15 percent of people said they would delete files or change passwords upon exiting a …

Don't miss

Cybersecurity news