Please turn on your JavaScript for this page to function normally.
bot
Bad bot traffic increases, gambling and airlines most targeted industries

Distil Networks analyzed hundreds of billions of bad bot requests at the application layer to provide insight and guidance on the nature and impact of automated threats in …

IoT
IoT device management market size worth $5.1 billion by 2025

The global IoT device management market size is anticipated to reach USD 5.1 billion by 2025, according to a new report by Grand View Research, exhibiting a 28.3% CAGR during …

IoT security
Third-party IoT risk management not a priority

With the proliferation of IoT devices used in organizations to support business, technology and operations innovation, respondents to an Ponemon Institute study were asked to …

firefighters
Digital innovation held back as IT teams firefight security threats

43% of IT executives at European financial institutions reveal that fears of a cyber-attack keep them awake at night – two months before the GDPR comes into force, according …

skull
Like any threat, malware evolves: Discover new trends

Cofense released the 2018 Cofense Malware Review, detailing the trends that defined malware attacks in 2017 and the emerging trends for network defenders to prioritize in …

hand
Businesses know breaches are happening, but do they know how, why and when?

Nearly four in five companies (79%) were hit by a breach in the last year, according to Balabit. Their research also revealed that 68% businesses expect to be impacted by …

cloud
Experiences and attitudes towards cloud-specific security capabilities

Dimensional research conducted a survey of IT professionals responsible for cloud environments. The survey, which is comprised of data collected from over 600 respondents from …

axe
Top cybersecurity evasion and exfiltration techniques used by attackers

SS8 released its 2018 Threat Rewind Report, which reveals the top cybersecurity evasion and exfiltration techniques used by attackers and malicious insiders. During the past …

virtual reality
Excessive alerts, outdated metrics, lead to over-taxed security operations centers

A new study, conducted by 360Velocity and Dr. Chenxi Wang, found that excessive alerts, outdated metrics, and limited integration lead to over-taxed security operations …

Network
Global WAN survey highlights the importance of network simplification

Cato Networks, provider of the global SD-WAN as a service Cato Cloud, released the findings of its enterprise WAN market study. The report, “State of WAN 2018: Too Complex to …

IoT
Worldwide IoT security spending to reach $1.5 billion in 2018

IoT-based attacks are already a reality. A recent CEB, now Gartner, survey found that nearly 20 percent of organizations observed at least one IoT-based attack in the past …

Facebook
Facebook’s trust crisis: Has it harmed democracy?

Barraged by accusations of spreading divisive fake news and amid new allegations that it handed over personal information on up to 50 million users without their consent, …

Don't miss

Cybersecurity news