
Europe and Russia home to half of credential theft victims worldwide
According to Blueliv’s credential detection data, since the start of 2018 there has been a 39% increase in the number of compromised credentials detected from Europe and …

DNS amplification attacks double in Q1 2018
DNS amplification types of DDoS attacks doubled in the first quarter of 2018 over last quarter, and spiked nearly 700 percent year-over-year, according to Nexusguard. …

IoT connections to grow 140%, will reach 50 billion by 2022
New data has revealed that the total number of connected IoT sensors and devices is set to exceed 50 billion by 2022, up from an estimated 21 billion in 2018. Juniper Research …

Compliance worries prevent greater cloud use
New research released by WinMagic shows that 87% of ITDMs limit their use of the cloud because of the complexity of managing regulatory compliance. A quarter said, it meant as …

Has paying the ransom become business as usual?
Radware released its 2018 Executive Application and Network Security Report. For the first time in the survey’s five-year history, a majority of executives (53%) reported …

Cost of lagging DevOps and microservice enablement? $34 million per year
Despite the vast majority of cloud management decision-makers believing that DevOps and microservice enablement are important, very few believe that their organizations are …

Banks planning further integration of regulatory data
Most global banks are planning to integrate their regulatory workflow data. But keeping up to date with the fast pace of regulatory change, as well as staying compliant with …

How employee behavior impacts cybersecurity effectiveness
A recent OpenVPN survey discovered 25 percent of employees, reuse the same password for everything. And 23 percent of employees admit to very frequently clicking on links …

With the GDPR, companies face new era of compliance and transparency
A new Avecto survey explored IT and security’s role in helping companies achieve compliance with the new guidelines for the collection and processing of personal …

Protecting consumers from mobile and IoT threats
A new report by Allot Communications revealed a dynamic and automated threat landscape in which consumers lack the security expertise to effectively protect themselves. Mobile …

Would you delete your account if a social media provider misused your data?
With the Facebook scandal involving Cambridge Analytica still fresh in people’s minds, two-thirds of professionals admit they would delete their account if a social media …

Five keys to secure DevOps, cloud and IoT adoption
90 percent of enterprises are engaged with at least one next-generation technology (NGT), such as cloud, IoT, or AI, according to BeyondTrust. Yet, while enterprises are …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)