Please turn on your JavaScript for this page to function normally.
roads
Most remain dissatisfied with threat intelligence quality and accuracy

While security professionals are increasingly recognizing the importance of threat intelligence, the majority remain dissatisfied with its accuracy and quality, according to a …

email
99 percent of domains are not protected by DMARC

Essentially every global domain is vulnerable to phishing and domain name spoofing. A new report incorporates data from Agari, revealing that 90 percent of its customers have …

architecture
IT ops and engineering are embracing automation to increase business agility

Based on a survey of nearly 700 engineering and operations individuals globally, a report by Indeni and GNS3 reveals a programming knowledge gap that is having an impact on …

Eyes
2017 was extraordinary: 5,200 breaches exposed 7.8 billion records

Once again, the record has been broken for both the most breaches and the most data compromised in a year. There were 5,207 breaches recorded last year, surpassing 2015’s …

person
Identity fraud enters a new era of complexity

The number of identity fraud victims increased by eight percent (rising to 16.7 million U.S. consumers) in the last year, a record high since Javelin Strategy & Research …

cloud storage
Cloud service adoption creates new data center demands

Both consumer and business applications are contributing to the growing dominance of cloud services over the Internet, according to the Cisco Global Cloud Index (2016-2021). …

technology
Data and analytics maturity: Most organizations should be doing better

91 percent of organizations have not yet reached a transformational level of maturity in data and analytics, despite this area being a number one investment priority for CIOs …

spotlight
8 trends in government tech for an enterprise-focused approach to IT

Deloitte examined emerging trends in government technology, and highlighted eight trends that are shaping strategic and operational transformations and redefining IT’s …

industry
Number of Internet-accessible ICS components is increasing every year

The number of industrial control system (ICS) components – which run factories, transport, power plants and other facilities – left open to Internet access, is …

BEC scams
BEC scams surge, cybercriminals target nearly all organizations

96 percent of organizations have received business email compromise (BEC) emails during the second half of 2017, according to Agari. “BEC is a particularly effective attack …

binary
Widespread API use heightens cybersecurity risks

A new Imperva survey showed a heightened concern for cybersecurity risk related to API use. Specifically, 63 percent of respondents are most worried about DDoS threats, bot …

IBM identity
Authentication today: Moving beyond passwords

A new global study from IBM Security examining consumer perspectives around digital identity and authentication, found that people now prioritize security over convenience …

Don't miss

Cybersecurity news