cybersecurity

The evolution of BYOD security in a mobile-first world
Bitglass’ research team surveyed 200 IT and security professionals at a national Gartner conference to learn more about the evolution of BYOD security in a mobile-first world. …

Ten important shifts impacting IT organizations over the next 36 months
As digitally-fueled disruptors continue to roil and reshape businesses and industries, the clear mandate for every enterprise is to reimagine and reconstruct itself to compete …

How much do criminals pay for certificates on the dark web?
The Cyber Security Research Institute (CSRI) conducted a six-month investigation into the sale of digital code signing certificates on the dark web. The research uncovered …

The mobile workforce: Productive, but susceptible to data compromise
An enterprise’s biggest problem when it comes to data compromise isn’t just technologies that are vulnerable, it’s how their employees use technology. Digital transformation, …

7 tips to reduce risks of data breaches
A recent study conducted by Forrester Consulting found that two-thirds of organizations have been breached five times in the past two years. It’s clear that traditional …

Ransomware victims are paying the ransom in record numbers
Intermedia examined the critical security behavioral habits of more than 1,000 office workers. Ransomware attacks continue to grow exponentially The threat of ransomware, when …

A closer look at hybrid cloud security challenges
Most enterprises face major challenges when managing security across their hybrid enterprise networks both during and after cloud migrations, according to AlgoSec. The …

Most organizations and consumers believe there is a need for IoT security regulation
90% of consumers lack confidence in the security of Internet of Things (IoT) devices. This comes as more than two-thirds of consumers and almost 80% of organizations support …

Chris Eng: An infosec journey from offense to defense
“Come to my lab, I promise you’ll learn something cool,” a friend told Chris Eng. Within a couple of hours, he had walked him through writing an exploit for …

Can an international cyber convention ever succeed?
The Cold War is a distant memory for most, but today we see a new struggle for dominance on the global stage – with cyber weapons being the latest focal point. The advance of …

Top threats impacting endpoint security decisions
Enterprise Strategy Group surveyed 300 IT and information security professionals from large midmarket and enterprise-class organizations in order to examine the top threats …

Most SMBs are not worried about their business being hacked
America’s small business owners may want to consider placing a greater emphasis on cyber awareness and best practices year-round. According to a new survey by Paychex, …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise