
CEO email exposure underscores the importance of password management
Nearly one in three major CEOs has been pwned using their company email address, according to a new F-Secure study. In other words, a service they access using their company …

Lending industry faces higher fraud costs than e-commerce, retail and financial services
Lenders face higher costs of fraud than other industries, including retail, e-commerce and financial services. For every dollar of fraud, lending companies incur $2.82 in …

Data-driven analysis of vulnerabilities in real-world OT networks
Operational Technology (OT) networks are ripe targets for adversaries, whose motives range from criminal intent to operational disruption and even threats to human and …

Cloud security today: Complexity, compliance, and containerization
An new report by Threat Stack and ESG sheds light on the security and business challenges that accompany the growth of public cloud environments and containers. Overall, the …

Immersive technologies are game changers for cybersecurity job growth
A new ESG study, which surveyed more than 500 people aged 16 to 24, revealed that 74% of respondents said the use of VR tools would increase their likelihood of pursuing …

Cybercriminals focus on the shipping and cloud storage sectors
The Anti-Phishing Working Group’s latest report found upticks in phishing attacks against companies in the Logistics & Shipping as well Cloud Storage & File …

The complex digital life of the modern family: Online safety and privacy concerns
The National Cyber Security Alliance (NCSA) conducted a study to better understand teens and parents’ attitudes, concerns and knowledge base about online safety and …

Can it be true? Most consumers value security more than convenience
52 percent of UK consumers think fraud is an inevitable part of shopping online, according to Paysafe, a global payments provider. What are the top three challenges of …

Business suffers as over-zealous security tools block legitimate work
Most security teams utilise a ‘prohibition approach’ – i.e. restricting user access to websites and applications – a tactic which is hampering productivity and innovation …

Most organizations don’t have SSH security policies in place
Cybercriminals can abuse SSH keys to secure and automate administrator-to-machine and machine-to-machine access to critical business functions. According to Venafi’s research, …

Enterprise container security: There’s room for improvement
With companies such as Facebook, Netflix and Google heralding the use of containers for their agility, portability, and cost benefits – enterprises are following suit. …

Digital skills gap: The biggest hindrance to addressing cybersecurity?
Although businesses recognize the importance of digital transformation, organizations worldwide are struggling to balance the elements needed to deliver on digital. Of 1,625 …