Preparing for a career in cybersecurity? Check out these statistics
This article includes excerpts from various reports that provide statistics and insights on cybersecurity jobs, skills shortages, and workforce dynamics. Lack of skills and …
Security providers view compliance as a high-growth opportunity
85% of managed service and security providers face significant challenges maintaining compliance for customers, with lack of resources, expertise, or technology cited as the …
Why CISOs need to build cyber fault tolerance into their business
CISOs who elevate response and recovery to equal status with prevention are generating more value than those who adhere to outdated zero tolerance for failure mindsets, …
Cybersecurity pros change strategies to combat AI-powered threats
75% of security professionals had to change their cybersecurity strategy in the last year due to the rise in AI-powered cyber threats, with 73% expressing a greater focus on …
Cyber insurance isn’t the answer for ransom payments
Ransomware remains an ongoing threat for organizations and is the largest single cause of IT outages and downtime as 41% of data is compromised during a cyberattack, according …
26% of organizations lack any form of IT security training
26% of organizations don’t provide IT security training to end-users, according to Hornetsecurity. The Hornetsecurity survey, which compiled feedback from industry …
78% of SMBs fear cyberattacks could shut down their business
94% of SMBs have experienced at least one cyberattack, a dramatic rise from 64% in 2019, according to ConnectWise. This increase in cyberattacks is exacerbated by the fact …
Chinese attackers leverage previously unseen malware for espionage
Sophos released its report, “Operation Crimson Palace: Threat Hunting Unveils Multiple Clusters of Chinese State-Sponsored Activity Targeting Southeast Asia,” which details a …
Find out which cyber threats you should be concerned about
This article includes excerpts from various reports that offer statistics and insights into the current cyber threat landscape. Human error still perceived as the Achilles’ …
Security challenges mount as companies handle thousands of APIs
Modern applications are taking over enterprise portfolios, with apps classed as modern now making up 51% of the total, up by more than a quarter in the last year, according to …
Businesses must prioritize digital trust to avoid major problems
As organizations pursue digital transformation, they urgently need to prioritize digital trust to achieve their goals and prepare for future market opportunities, legislation, …
Lack of skills and budget slow zero-trust implementation
The risk of a cyber breach is the number one global driver for zero trust strategy implementation, according to Entrust. The 2024 State of Zero Trust & Encryption Study …
Featured news
Resources
Don't miss
- Microsoft fixes exploited zero-day (CVE-2024-49138)
- Attackers actively exploiting flaw(s) in Cleo file transfer software (CVE-2024-50623)
- Preventing data leakage in low-node/no-code environments
- Strengthening security posture with comprehensive cybersecurity assessments
- Neosync: Open-source data anonymization, synthetic data orchestration