
Dark web ransomware economy: Sellers pulling in six-figure salaries
There are currently more than 6,300 estimated dark web marketplaces selling ransomware, with more than 45,000 current product listings, according to new research by Carbon …

Hackers go after Australian ICT, managed services providers
The Australian Cyber Security Centre (ACSC), which integrates the national security cyber capabilities and serves as a hub for collaboration and information sharing with the …

Do board members treat cybersecurity as a top priority?
Despite high profile cyberattacks continuing to occur, almost half of IT decision makers (ITDMs) at 250+ employee organizations around the world still believe that business …

Leaving employees to manage their own password security is a mistake
Despite the clear and present danger that weak passwords pose to organizations, many remain focused on implementing technology based on policy, not the user, to address the …

Most decision makers expect ROI from artificial intelligence within two years
Cylance polled 652 IT decision makers in the U.S., UK, Germany and France, and found that optimism about the value of artificial intelligence-powered solutions in the …

Beyond GDPR: Data protection as a competitive advantage
A new McAfee report shows that 48 percent of organizations will migrate their data to a new location because of regulations like GDPR. A similar amount will migrate their data …

Most network endpoints are in the dark: Do you know how to find them?
Traditional manual endpoint security approaches are ineffective and resource-intensive, leading to neglect of basic maintenance such as patches and updates, according to …

Outsmarting grid security threats
Almost two-thirds (63 percent) of utility executives believe their country faces at least a moderate risk of electricity supply interruption from a cyberattack on electric …

IT concerned about losing jobs while industry worried about IT talent shortage
While the cybersecurity industry is desperately trying to manage a worldwide shortage of qualified cybersecurity professionals, 56 percent of these professionals fear they’ll …

Top blacklisted Android and iOS apps by enterprises
Enterprises blacklist apps for a range of security concerns, including specific malicious or data leakage behaviors, security policy compliance and concerns about shadow data …

When it comes to data breaches, consumers don’t know where to turn
The results of a new Identity Theft Resource Center (ITRC) study on consumer perceptions and behaviors in response to identity theft and data breaches demonstrate widespread …

How boardrooms are safeguarding digital assets
More than 90 percent of surveyed senior business leaders agree that strong technology governance contributes to improved business outcomes and increased agility, according to …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)