Please turn on your JavaScript for this page to function normally.
healthcare
Researchers develop AI technique to protect medical devices from anomalous instructions

Researchers at Ben-Gurion University of the Negev have developed a new AI technique that will protect medical devices from malicious operating instructions in a cyberattack as …

brain
62% of blue teams have difficulty stopping red teams during adversary simulation exercises

New Exabeam research shows that 62 percent of blue teams have difficulty stopping red teams during adversary simulation exercises. Respondents named threat detection, incident …

cloud
Integrated cloud-native security platforms can overcome limitations of traditional security products

To close security gaps caused by rapidly changing digital ecosystems, organizations must adopt an integrated cloud-native security platform that incorporates artificial …

cloud
Most malware in Q1 2020 was delivered via encrypted HTTPS connections

67% of all malware in Q1 2020 was delivered via encrypted HTTPS connections and 72% of encrypted malware was classified as zero day, so would have evaded signature-based …

stock price
Increasing awareness of cyber risks among SMBs to boost MDR revenues

The increasing number of sophisticated cyber threats will lead to a rise in demand for Managed Detection and Response (MDR) solutions from small and medium businesses. The …

DDoS
Average bandwidth of DDoS attacks increasing, APIs and applications under attack

The volume and complexity of attacks continued to grow in the first quarter of 2020, according to Link11. There has been an increasing number of high-volume attacks in Q1 …

cloud
Cloud-enabled threats are on the rise, sensitive data is moving between cloud apps

44% of malicious threats are cloud enabled, meaning that cybercriminals see the cloud as an effective method for subverting detection, according to Netskope. “We are seeing …

network
What is flowing through your enterprise network?

Since Edward Snowden’s revelations of sweeping internet surveillance by the NSA, the push to encrypt the web has been unrelenting. Bolstered by Google’s various initiatives …

shield
What makes some organizations more cyber resilient than others?

Despite higher levels of investment in advanced cybersecurity technologies over the past three years, less than one-fifth of organizations are effectively stopping …

gap
Majority of 2019 breaches were the result of unapplied security patches

Despite a 24% average increase in annual spending on prevention, detection and remediation in 2019 compared with 2018, patching is delayed an average of 12 days due to data …

connection
How important is packet capture for cyber defense?

Organizations using full packet capture are better prepared to battle cyber threats, according to an Enterprise Management Associates (EMA) report. Visibility and accuracy of …

Market
Global security screening systems market to reach $12.2 billion by 2024

The global security screening systems market was worth $7.9 Billion in 2018, according to ResearchAndMarkets. Security screening refers to any electronic, visual or manual …

Don't miss

Cybersecurity news