Please turn on your JavaScript for this page to function normally.
cloud
Complexity and budgetary constraints complicate cloud security

While spending on cloud services is high, with more than half of respondents having spent more than $10 million and 11% having spent more than $100 million in the last three …

cloud
Organizations struggle to maintain application security across platforms

Global organizations are struggling to maintain consistent application security across multiple platforms, and they are also losing visibility with the emergence of new …

fire
Cyber crisis response failing to adapt to modern threats

Today, a stark disconnect exists between the inadequacy of crisis exercising and the desire to build an effective cyber crisis response function, according to an Osterman …

Phishing
Phishing is a huge concern among security decision-makers and influencers

A serious disconnect exists between how decision makers (i.e., CISOs, CIOs and CEOs), and security practitioners (i.e., IT managers and directors, security architects and …

person
Employees aware of privacy risks, but unsure of how they affect the workplace

62 percent of employees are unsure if their organization has to comply with the recently-enacted CCPA, which gives California residents enhanced consumer data privacy rights, …

CCPA
Most businesses have yet to allocate a CCPA compliance budget

Only 15% of organizations report having a mature approach to data privacy, 59% have yet to allocate budget to CCPA compliance, and 58% are currently using or will look to …

brain
The benefits and limitations of AI in cybersecurity

Today’s AI cannot replace humans in cybersecurity but shows promise for driving efficiency and addressing talent shortage, a new report by ​ProtectWise has shown. Penetration …

network
The state of network security in organizations with 1000+ employees

Security team size at the largest organizations does not scale with the number of overall employees, but they are more likely to include staff with specialized roles, say the …

business
Nearly 15% of US security budgets go to remediating active compromises

Malwarebytes and Osterman Research have polled 900 senior IT decision-makers and IT security professionals in Australia, Germany, the US, UK, and Singapore about the impact of …

Office 365
How can Office 365 phishing threats be addressed?

With the rapid expansion of Office 365, more and more threats can emerge within its infrastructure, particularly via email. This is due in part to the size and ease of …

IoT
Is your IoT strategy creating security holes?

Although most organizations plan to increase adoption of IoT into operations, only 28 percent consider security strategies specific to IoT as “very important.” Anticipated …

Microsoft Windows
New year, new patches: A look back and what to expect in the future

As to be expected when ringing in a new year, there are predictions galore flooding social media and that includes the cybersecurity space. Predications are more than just …

Don't miss

Cybersecurity news