Please turn on your JavaScript for this page to function normally.
door
How security pros look at encryption backdoors

The majority of IT security professionals believe encryption backdoors are ineffective and potentially dangerous, with 91 percent saying cybercriminals could take advantage of …

icosahedral
DevOps skills gap: Do you have the necessary skills to succeed?

New research shows that software developers are not receiving the training they need to be successful as DevOps becomes the prevalent approach to building and operating …

IoT world
US, China and the UK are top regions affected by IoT security threats

In the Internet of Things (IoT) ecosystem today, cyberattacks are becoming more diverse and sophisticated with cybercriminals taking over home network routers to launch …

healthcare
Medical devices and the Internet of Things: Defending against cyber threats

More than one-third (35.6 percent) of surveyed professionals in the Internet of Things-connected medical device ecosystem say their organizations have experienced a …

watch
AI is key to speeding up threat detection and response

Time is the most important factor in detecting network breaches and, consequently, in containing cyber incidents and mitigating the cost of a breach. “Security event …

Wi-Fi
Unsecured Wi-Fi hotspots and troubling browsing behaviors

As adoption of cloud and mobile continues to rise, common employee practices inside and outside the workplace create risk for enterprises. To uncover the risks posed by users’ …

IoT
Who is better prepared for IoT-related attacks, SMEs or large organizations?

Small and midsized organizations (SMEs) are taking more steps to protect themselves from security risks associated with the Internet of Things (IoT) than large businesses, …

password
Password Power Rankings: A look at the practices of 40+ popular websites

Nothing should be more important for these sites and apps than the security of the users who keep them in business. Unfortunately, Dashlane found that that 46% of consumer …

data
Attacks on manufacturing industry continue to rise

The frequency and sophistication of cyber attacks continues to rise globally according to research data in the Q2 Threat Intelligence Report released by NTT Security. Four …

cables
Most organizations are not leveraging the benefits of business agility

Only 12 percent of organizations can claim that their whole organization is on the path to business agility, according to CA Technologies. The survey finds improved business …

woman
What leads women to cybersecurity, and what makes them stay?

Many studies have shown that different perspectives result in a better understanding of problems and, ultimately, in better solutions for everybody. But even though it’s …

lock
Malicious content delivered over SSL/TLS has more than doubled in six months

Threats using SSL encryption are on the rise. An average of 60 percent of the transactions in the Zscaler cloud have been delivered over SSL/TLS. Researchers also found that …

Don't miss

Cybersecurity news