Please turn on your JavaScript for this page to function normally.
PKI
Lack of resources and skills continues to challenge PKI deployment

Driven by organizational changes, enterprise use of Public Key Infrastructure (PKI) and digital certificates has never been higher, while the related skills to manage PKI are …

architecture
As technology pervades, CIOs’ influence on business strategy grows

An IBM Institute for Business Value (IBV) study revealed CIOs’ influence on business strategy and operations is growing as technology pervades surveyed enterprises. When …

DDoS
DDoS attacks were a more serious threat in Q3 2021 than ever before

Link11 has released new data from its network on the development of the DDoS threat: The number of attacks remains at a very high level in Q3 2021. After Q2 2021 had already …

Phishing
Phishing attacks grow 31.5% over 2020, social media attacks continue to climb

Phishing remains the dominant attack vector for bad actors, growing 31.5 percent over 2020, according to a PhishLabs report. Notably, attacks in September 2021 were more than …

ransomware
Organizations believe they are ready for ransomware attacks

Over the past year there has been a dramatic rise in ransomware attacks, and while all organizations are a target, large enterprises are bearing the brunt – experiencing …

bank
Banking malware threats are increasing sharply

Banking malware threats are sharply increasing as cybercriminals target the rising popularity of mobile banking on smartphones, with plots aimed at stealing personal banking …

cloud money
Cloud adoption growing steadily, but cost and regulatory challenges remain

O’Reilly announced the findings of a survey report which explores the latest trends in cloud, microservices, distributed application development, and other critical …

phishing
Mobile phishing exposure in the energy industry surged 161% in 2021

Mobile phishing exposure surged 161% within the energy industry between the second half of 2020 and the first half of 2021, a Lookout report reveals. The research indicates …

architecture
Security teams need to become more proactive and risk-driven

83% of companies would suffer business damage during the first 24 hours of an outage and thereafter, which comes as no surprise with recent surges in ransomware and other …

criminal
77% of rootkits are used for espionage purposes

In a new report, Positive Technologies analyzes this past decade’s most infamous families of rootkits – programs that hide the presence of malicious software or …

DDoS
Blocked DDoS events up 75% in the first nine months of 2021

Radware has published results from its report which provides an overview of the DDoS attack landscape, application attack developments, and unsolicited network scanning …

attacks
Surge in cyber attacks confirms the need for zero trust security

Zscaler announced the release of a report that tracked and analyzed over 20 billion threats blocked over HTTPS, a protocol originally designed for secure communication over …

Don't miss

Cybersecurity news