cybersecurity
Surge in exposed credentials puts companies at risk
The volume of credential exposures has increased to 16,583 from April to July 2017, compared to 5,275 last year’s analysis by Anomali. 77% of the FTSE 100 were exposed, with …
Data breaches hurt loyalty
A majority (70%) of consumers would stop doing business with a company if it experienced a data breach, according to a survey of more than 10,000 consumers worldwide conducted …
10 tips to optimize security during the holidays
Optiv Security shared its annual list of tips to help organizations get the most from their security programs during the busy holiday season. A team of security experts …
Infosec expert viewpoint: DevOps security
A Ponemon Institute survey of nearly 1,250 global public sector IT decision makers and managers revealed that public sector organizations undergoing digital transformation are …
Not everything is sophisticated, let’s keep it simple
I don’t have dandruff. But if I did, then I could use a new sophisticated formula to cure my condition. Whether the problem is dandruff or a malware-related threat, the term …
Six data security questions that every board needs to ask
As data breaches become a constant headline, data security should be a major concern for company boards everywhere. Unless a board member has been hired specifically to …
Only 12% or organizations are likely to detect a sophisticated cyber attack
Organizations believe that today’s cyber threat landscape places them at high risk of cyber attacks. The EY survey of nearly 1,200 C-level leaders of the world’s …
Black Friday: When is a deal too good to be true?
Black Friday, the American sales phenomenon that allegedly marked the time of year when retailers began to make a profit – moving from the ‘red’ to the ‘black’ – has …
5 cloud storage predictions for 2018
At this point, the cloud is old news. This does not, however, diminish its continuing impact on individuals and businesses worldwide. As cloud-based services strive towards …
Why hackers reuse malware
Software developers love to reuse code wherever possible, and hackers are no exception. While we often think of different malware strains as separate entities, the reality is …
South Korea Winter Olympics: Cyber lessons from the past
There is little doubt that guns, gates, and guards will be on full alert in Pyeongchang, South Korea as the nation readies itself for the 2018 Winter Olympics, which begin …
Sad state of enterprise cloud infrastructure governance
A new survey of more than 300 IT professionals, conducted by Propeller Insights in October 2017, revealed that the state of enterprise cloud infrastructure governance is …
Featured news
Resources
Don't miss
- Design weaknesses in major password managers enable vault attacks, researchers say
- ISC2 webinar: Power up your exam prep!
- OT teams are losing the time advantage against industrial threat actors
- Firmware-level Android backdoor found on tablets from multiple manufacturers
- Your encrypted data is already being stolen