cybersecurity

Four differences between the GDPR and the CCPA
By passing the California Consumer Privacy Act (CCPA), which goes into effect on January 1, 2020, the Golden State is taking a major step in the protection of consumer data. …

CISOs: Change your mindset or lose your job
Capgemini commissioned IDC to produce a new piece of research, which reveals the increasing pressure on the Chief Information Security Officer to drive forward digital …

Evaluating the biggest cyber threats to the electric power sector
The network of power plants and lines connecting to homes and businesses is widely considered to be among the most critical infrastructure in the world. It’s also one of …

Email authentication use growing steadily in every industry sector
U.S. federal government agencies and many major enterprises have made significant strides to thwart the spread of fake emails, a major cybersecurity attack vector. But many …

Safeguarding your data from human error and phishing attacks with the cloud
This is the third article of a series, the first article is available here, and the second one is here. In a world of ransomware attacks, companies should prepare for the …

Is your organization ready for the data explosion?
“Data is the new oil” and its quantity is growing at an exponential rate, with IDC forecasting a 50-fold increase from 2010 to 2020. In fact, by 2020, it’s estimated that new …

Employees report 23,000 phishing incidents annually, costing $4.3 million to investigate
Account takeover-based (ATO) attacks now comprise 20 percent of advanced email attacks, according to Agari’s Q1 2019 Email Fraud & Identity Deception Trends report. …

Taking ethical action in identity: 5 steps for better biometrics
Glance at your phone. Tap a screen. Secure access granted! This is the power of biometric identity at work. The convenience of unlocking your phone with a fingertip or your …

eCommerce credit card fraud is nearly an inevitability
Riskified surveyed 5,000 US-based consumers aged 18 and older about their online shopping behaviors, experience with and prevalence of credit card fraud, repeat shopping …

Free training course material on network forensics for cybersecurity specialists
Based on current best practices, the training includes performance indicators and means that will help those who take it increase their operational skills of tackling cyber …

The biggest cybersecurity challenge? Communicating threats internally
IT executives responsible for cybersecurity feel a lack of support from company leaders, and 33 percent feel completely isolated in their role, according to Trend Micro. IT …

$1.7 billion in cryptocurrency was stolen and scammed in 2018
$1.7 billion in cryptocurrency was stolen and scammed in 2018 — a dramatic rise in criminal activity despite a slump in the market, according to CipherTrace. Criminals need to …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025