End-to-end network segmentation essential for security, yet few deploy
As point-of-sale breaches, ransomware attacks and various other customer data breaches continue to make local and national headlines, IT professionals agree that network …
                                Are all IoT vulnerabilities easily avoidable?
Every vulnerability or privacy issue reported for consumer connected home and wearable technology products since November 2015 could have been easily avoided, according to the …
                                43.7% of cloud-based malware delivers ransomware
According to a new Netskope report, 43.7% of malware found in enterprises cloud apps have delivered ransomware, and 55.9% of malware-infected files found in cloud apps are …
                                Top network security and data privacy concerns among businesses
With network security top of mind, businesses are nearly two times more concerned with losing private data (47 percent) than hackers disrupting their systems (26 percent), …
                                ISPs treat cyber security as a top priority
Better law enforcement training and coordination of cyber security and support for a government-backed awareness campaign are two key findings of an ISP survey by the Internet …
                                Can Big Data analytics strengthen your security posture?
The Ponemon Institute released the results of its first report focused on how big data analytics are being used by organizations to strengthen cybersecurity postures. Their …
                                Mobile ransomware increases 200 percent
There’s been a startling 200 percent increase in mobile ransomware detection in Q2, according to Quick Heal. This amounts to nearly 50 percent of the ransomware detected …
                                Ubiquity and danger: The web scraping economy
Web scraping is a technique of extracting information from web sites, and often includes transforming unstructured web site data into a database for analysis or repurposing …
                                55% of apps are already in the cloud, security a priority
Executives are increasingly adopting a digital business model, with the cloud as the key enabler. However, security concerns and tepid execution complicate the ability of the …
                                Feds are using big data analytics for cybersecurity, but is it effective?
81 percent of Feds say their agency is using big data analytics for cybersecurity in some capacity – 53 percent are using it as a part of their overall cybersecurity strategy …
                                How much of a risk is BYOD to network security?
We’re all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system …
                                The current state of privileged access management practices
There’s a widening gulf between organizations that adhere to best practices for privileged access management, according to BeyondTrust. Password and credential …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down