Total cost of average data breach reaches $3.8 million
The average consolidated total cost of a data breach is $3.8 million, according to a Ponemon Institute study of 350 companies spanning 11 countries.The study also found that …
Most organizations value threat intelligence sharing
94% of respondents to an Enterprise Strategy Group (ESG) study believe it is highly or somewhat valuable to share threat intelligence information between federal agencies and …
Companies stay vulnerable to web attacks for far too long
While no true security best practices exist, the key is in identifying the security metrics that mean the most to the organization and focusing on those activities to …
The rise in false fraud alerts
68% of Americans who have received a fraudulent activity alert from their credit or debit card issuer have received at least one alert in error, according to …
DDoS attacks double, old web application attack vectors still active
Akamai Technologies analyzed thousands of DDoS attacks as well as nearly millions of web application attack triggers across the Akamai Edge network.A surge in DDoS attack …
Can you afford to wait 197 days to detect a threat?
Financial services and retail organizations agree, advanced threats are the most serious security challenge facing their organizations, shows a new Ponemon Institute study. …
The cybersecurity domino effect
RedSeal unveiled its survey of high-ranking executives that illustrates widespread concern regarding the potential effects of cyberattacks in corporate America.Most of the …
New domains revive old spam
The new generic top-level domain (gTLD) registration program, launched in January 2014 and intended for use by relevant communities and organizations, has proved irresistible …
Organizations lack control over mobile workspaces
More than 64 percent of respondents to a SANS survey said a majority of their mobile workforce can access their organizations’ secure data remotely, yet less than 25 percent …
Do ethics get in the way of security professionals?
While it’s convenient to think that the information security industry is made up of highly ethical individuals who make the right decision every time, a stressful …
Data breaches lead to surge of spoofing attacks
The number of attacks on businesses is trending up as crimeware tools gain traction providing tools to fraudsters to automate cybercrime attacks leveraging the customer data …
Can you correctly identify phishing emails?
An Intel Security quiz presented ten emails and asked respondents to identify which of the emails were phishing attempts designed to steal personal information and which were …
Featured news
Sponsored
Don't miss
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity
- 25 cybersecurity AI stats you should know
- Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
- PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389)