Please turn on your JavaScript for this page to function normally.
risk
To improve incident response, you need to consider 3rd party solutions

Organizations reported an average 32% reduction in threat responder workload when they deployed a managed SIEM solution, according to CenturyLink and IDG. Improve incident …

network
Network complexity and lack of visibility contribute to misconfigurations and increased risk

Enterprises are slow to abandon manual processes, despite being short staffed, as the lack of automation, coupled with increasing network complexity risk and lack of …

tunnel
IT teams are embracing intent-based networking, investing in AI technologies

The network is vital to today’s digital business. Whether maximizing employee productivity, optimizing customer experience or keeping data protected and secure, the network is …

5G
Most decision makers expect AI and 5G to impact their cybersecurity strategy

An overwhelming majority of cybersecurity and risk management leaders believe that developments in 5G wireless technology will create cybersecurity challenges for their …

5G
5G adoption is expected to rapidly gather pace in North America

North America is one of the most advanced mobile regions in the world – a result of significant operator investments in 5G. 5G is coming The 2019 North America edition of the …

industrial
How to reduce the risk posed by vulnerabilities in IoT/ICS networks?

IoT/ICS networks and unmanaged devices are soft targets for adversaries, increasing the risk of costly downtime, catastrophic safety and environmental incidents, and theft of …

find
Researchers may have found a way to trace serial IP hijackers

Hijacking IP addresses is an increasingly popular form of cyberattack. This is done for a range of reasons, from sending spam and malware to stealing Bitcoin. It’s estimated …

5G
5G is here, now what?

5G is being positioned as a “network of networks” that will encompass public and private components, licensed and unlicensed spectrum, and even expand beyond cellular, to …

5G
What’s next for 5G?

The future of 5G lies in the enterprise, states ABI Research. Use cases across different vertical markets, such as industrial automation, cloud gaming, private Long-Term …

binary bomb
Year-over-year malware volume increased by 64%

The most common domains attackers use to host malware and launch phishing attacks include several subdomains of legitimate sites and Content Delivery Networks (CDNs) such as …

connection
How important is packet capture for cyber defense?

Organizations using full packet capture are better prepared to battle cyber threats, according to an Enterprise Management Associates (EMA) report. Visibility and accuracy of …

cybercrime
Fraudsters no longer operate in silos, they are attacking across industries and organizations

From January 2019 through June 2019, LexisNexis Risk Solutions recorded 16.4 billion transactions, of which 277 million were human-initiated attacks, a 13% increase over the …

Don't miss

Cybersecurity news