
File security violations within organizations have spiked 134% as the world reopened for business
BetterCloud surveyed more than 500 IT and security professionals—and examined internal data from thousands of organizations and users—to understand their top challenges, …

Most disaster recovery solutions are not tested on a regular basis
As organizations work diligently to support evolving business needs, while at the same time battling cybercrime and other threats to critical data, the majority of disaster …

Critical infrastructure cyberattacks signaling the importance of prioritizing security
Armis released new data uncovering the lack of knowledge and general awareness of major cyberattacks on critical infrastructure and an understanding of security hygiene. The …

What are the most common cybersecurity challenges SMEs face today?
Small and medium-sized enterprises (SMEs) are considered to be the backbone of Europe’s economy. 25 million SMEs are active in the EU, and employ more than 100 million …

Cybersecurity posture confidence high, yet incidents are increasing too
IronNet Cybersecurity released a report assessing timely topics such as the estimated cost per enterprise of the SolarWinds cyberattack, executive-level engagement in attack …

Organizations increasingly reluctant to pay ransomware demands
To better understand concerns about recent ransomware attacks, Menlo Security conducted a global poll on responses and reactions to ransomware. attacks. Organizations hit by …

How mobile operators view security in the 5G era
There’s a major gap in security capability among mobile operators, which in many cases is not yet being filled by industry partnerships, Trend Micro reveals. In the 5G …

Industrial facilities progressively at risk of data theft and ransomware attacks
Trend Micro released a new report highlighting the growing risk of downtime and sensitive data theft from ransomware attacks aimed at industrial facilities. “Industrial …

Enhancing cloud security with a two-step cryptography technique
The central goal of cloud computing is to provide fast, easy-to-use computing and data storage services at a low cost. However, the cloud environment comes with data …

XDR: Security’s new frontier
As enterprises transform their IT environment and workforce, finding the right security approach is critical for success. Without the proper protective measures in place, …

Chief Compliance Officers must embrace new leadership responsibilities
As demands on the compliance function grow more intense, Chief Compliance Officers (CCOs) must proactively embrace new leadership responsibilities for their role and …

Major threats to cloud infrastructure security include a lack of visibility and inadequate IAM
98% of companies had experienced at least one cloud data breach in the past 18 months compared to 79% last year, according to an IDC survey. Meanwhile, 67% reported three or …
Featured news
Resources
Don't miss
- macOS vulnerability allowed Keychain and iOS app decryption without a password
- Sitecore zero-day vulnerability exploited by attackers (CVE-2025-53690)
- Cutting through CVE noise with real-world threat signals
- Attackers are turning Salesforce trust into their biggest weapon
- Cloudflare confirms data breach linked to Salesloft Drift supply chain compromise