Please turn on your JavaScript for this page to function normally.
cloud
Cloud business initiatives accelerating faster than security teams’ ability to secure them

The speed of cloud business initiatives is hampering organizations’ ability to secure and manage hybrid environments, with security personnel often not included. The 2019 …

Netscout
Attackers continue to enhance their performance, apply smart business techniques

During the second half of 2018, attackers bulked up existing tactics, rapidly evolvied new performance enhancements, and applied smart business techniques to vastly accelerate …

keys
Privileged credential abuse is involved in 74% of data breaches

Most IT decision makers are not prioritizing Privileged Access Management (PAM) practices and solutions, despite knowing privileged credential abuse is involved in almost …

IoT security
Researchers and businesses need to work together to expose IoT vulnerabilities

As the Internet of Things (IoT) grows and smart devices gain popularity, cybercriminals will continue to find new ways to exploit all connected things. Two new vulnerabilities …

money
Social media-enabled cybercrime is generating $3.25 billion a year

Social media-enabled cybercrime is generating at least $3.25B in global revenue annually, according to an extensive six-month academic study undertaken by Dr. Mike McGuire, …

Door
Increasing security measures are driving cybercriminals to alter their techniques

Increased security measures and awareness are driving cybercriminals to alter their techniques in search of a better return on investment (ROI). Total recorded vulnerabilities …

glasses
Consumer attitudes towards security breaches are changing significantly

Transatlantic businesses face greater short-term pain in the US but less long term retribution in the UK following a security breach, according to new data from payment …

IoT
Most IoT devices are being compromised by exploiting rudimentary vulnerabilities

Cybercriminals are looking for ways to use trusted devices to gain control of Internet of Things (IoT) devices via password cracking and exploiting other vulnerabilities, such …

healthcare
Healthcare industry: Key trends and cybersecurity challenges

Each year, Bitglass analyzes data from the U.S. Department of Health and Human Services’ “Wall of Shame,” a database containing information about breaches of protected health …

Android
Businesses believe they should be patching their Android devices more frequently

The use of Android tablets and handhelds are on the rise in business but security remains a concern. On average, 72% of tablets and handheld devices in businesses (excluding …

lock
Accidental data breaches are often compounded by a failure to encrypt

83 percent of security professionals believe that employees have accidentally exposed customer or business sensitive data at their organization. Accidental data breaches are …

money
Criminal groups promising salaries averaging $360,000 per year to accomplices

New research from Digital Shadows reveals that criminal groups are promising salaries averaging the equivalent of $360,000 per year to accomplices who can help them target …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools