cybersecurity

Businesses know breaches are happening, but do they know how, why and when?
Nearly four in five companies (79%) were hit by a breach in the last year, according to Balabit. Their research also revealed that 68% businesses expect to be impacted by …

Phishing, malware, and cryptojacking continue to increase in sophistication
Attackers are constantly trying new ways to get around established defenses. The data, collected throughout 2017 by Webroot, illustrates that attacks such as ransomware are …

Experiences and attitudes towards cloud-specific security capabilities
Dimensional research conducted a survey of IT professionals responsible for cloud environments. The survey, which is comprised of data collected from over 600 respondents from …

Excessive alerts, outdated metrics, lead to over-taxed security operations centers
A new study, conducted by 360Velocity and Dr. Chenxi Wang, found that excessive alerts, outdated metrics, and limited integration lead to over-taxed security operations …

Worldwide IoT security spending to reach $1.5 billion in 2018
IoT-based attacks are already a reality. A recent CEB, now Gartner, survey found that nearly 20 percent of organizations observed at least one IoT-based attack in the past …

Understanding email fraud: Do you have visibility into email threats?
82% of boards are concerned with email fraud, and 59% consider it a top security risk – no longer just an IT issue. Yet 30% of respondents to a survey conducted by …

Middle East oil and gas companies are unprepared to address OT cyber risk
Cyber security breaches in the Middle East are widespread and frequently undetected, with 30 percent of the region’s attacks targeting operational technology (OT), finds a new …

Why PKI will secure the Internet of Things for years to come
A long, long time ago, nearly 4,000 years, in a land far, far away ancient cryptography was born. The Place? Egypt. It is there historians believe the technique was invented …

The great attribution debate: Why we should focus on HOW not WHO
Organisations often don’t understand what they need to be protecting themselves from when it comes to costly cyber-attacks. The threat landscape is becoming ever-more …

Cybercriminals launder money through mansions, private islands and crypto currency
Cybercriminal proceeds make up an estimated 8-10 percent of total illegal profits laundered globally, amounting to an estimated $80-$200 billion each year, according to a …

Research explores minority representation within the cybersecurity field
A new (ISC)2 report measures minority representation in the U.S. cybersecurity profession and aims to understand the challenges these highly skilled individuals experience. …

IT leaders wrestling hyper-converged infrastructure security
New research from WinMagic, surveying over 1,000 IT Decision Makers (ITDM) about hyper-converged infrastructure (HCI) has revealed flexibility (65%), performance (58%) and …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025