cybersecurity

A smooth transition to the cloud is possible with identity governance
It comes as no surprise that organizations large and small are considering adopting the cloud as part of their overall IT strategy. The variety of impressive benefits that the …

Password behaviors remain largely unchanged
Despite today’s increased threat landscape and heightened global awareness of hacking and data breaches, password behaviors remain largely unchanged. Data from a survey …

Most top travel websites fail to protect user security
Dashlane examined password and account security on 55 of the world’s most popular travel-related sites, and found that 89% of sites leave their users’ accounts perilously …

Do public clouds make it more difficult to get visibility into data traffic?
The second annual Ixia 2018 Security Report analyzes how enterprise network attack surfaces are increasing as the perimeter of the traditional network expands into the cloud. …

Public breaches drive increase in account takeover attempts
Distil Networks released The 2018 Anatomy of Account Takeover Attacks Report, based on data from 600 domains that include login pages. The study revealed that all monitored …

Why good security foundations are better than the best security mitigation
Since founding VDOO, we have been working to analyze a great many IoT devices, in the broadest way possible. The more we look into these devices and find their …

Unsurprisingly, most won’t be ready for GDPR on 25th May
With less than a month until the GDPR comes into force, many companies will not be ready when it takes effect on May 25th, 2018. 62% of IT Decision Makers (ITDMs) surveyed …

Only half of CI/CD workflows include appsec testing elements
Only half of CI/CD workflows include application security testing elements despite respondents citing awareness of the importance and advantages of doing so, according to a …

Adoption of security ratings platforms is on the rise
Forrester Consulting surveyed 158 security leaders to evaluate how enterprises are assessing and managing security threats to their IT infrastructure, as well as to their …

Small merchants are not effectively engaging with PCI programs
Smaller merchants are systematically failing to engage with PCI compliance programs, according to a new acquirer survey from Sysnet Global Solutions. The survey revealed that …

Can existing endpoint security controls prevent a significant attack?
Endpoint security solutions are failing to provide adequate protections to address today’s security threats, specifically malware, according to Minerva Labs. A majority of the …

Cyber risk assessment and disclosure requirements: What’s important to you?
In this podcast recorded at RSA Conference 2018, Jerry Caponera, VP cyber risk strategy at Nehemiah Security, offers some interesting thoughts on cyber risk assessment and …
Featured news
Resources
Don't miss
- What makes a security program mature and how to get there faster
- EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations
- Win-DDoS: Attackers can turn public domain controllers into DDoS agents
- How Brandolini’s law informs our everyday infosec reality
- From legacy to SaaS: Why complexity is the enemy of enterprise security