Please turn on your JavaScript for this page to function normally.
mask
Attackers opt for discreet methods to spy inside the network

For its latest report, Vectra analyzed data from 120 customer networks comprised of more than 1.3 million hosts over the first quarter of 2016. All organizations showed signs …

Most organizations still lack visibility into database assets

Only 19 percent of organizations have what the organization considers to be “excellent” visibility into their data and database assets, according to Osterman …

Desk
Compromised credentials still to blame for many data breaches

Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance (CSA). Data breaches, account hijacking and …

industry
The future of ICS security depends on OT-centric security solutions

New cybersecurity operational technologies are emerging to protect industrial control systems (ICS) against impending IT threats and attacks. ABI Research indicates that …

payment card
Increase in credit card leaks with high profile apps and sites

A new report reveals a continued rise in apps and mobile websites leaking credit card data, with several new cases from prominent brands, including the Hong Kong metro system. …

Solutionary report
A global data analysis of hostile activity

Solutionary’s latest Global Threat Intelligence Report contains information from 24 security operations centers, seven R&D centers, 3.5 trillion logs, 6.2 billion …

vault
Ransomware attacks escalate, companies largely unprepared

Ransomware attacks against endpoints have recently taken place against hospitals in the US and Germany. Attacks have increased in severity to the point that the FBI issued an …

business
Exposing the Cybercrime as a Business model

Trustwave released a new report which reveals the top cybercrime, data breach and security threat trends from 2015. Experts gathered real-world data from hundreds of breach …

desk
Employees risk corporate security by accessing pirated content

6 in 10 Brits who use personal devices for work also use the same device for streaming or downloading pirated content. Whilst the research, conducted by OnePulse, found that …

threat hunting
The rise of threat hunting

85 percent of enterprises have already adopted some form of threat hunting to aggressively track and eliminate cyber adversaries as early as possible. This proactive model …

cloud binary
Trust is the key to cloud adoption

Intel Security released a global report advocating the need for technology vendors to help businesses, governments and consumers understand the implications surrounding …

Why few US consumers penalize hacked companies?

About a quarter of American adults reported that they were notified about their personal information being part of a data breach in the previous year, but only 11 percent of …

Don't miss

Cybersecurity news