
Challenges and benefits of using threat data feeds
Threat data feeds can help organizations strengthen their cybersecurity posture, according to a report from the Ponemon Institute. As cyberthreats proliferate, many …

Distributed and remote work creating a perfect storm for network security teams
Distinct priorities have emerged when it comes to responding to the needs of IT security’s rapid transformation, a FireMon research has found. The survey of 500 cybersecurity …

Hidden areas of security and the future of hybrid working
The pandemic has changed how many companies operate in a short period of time. Over the last year we’ve witnessed most organizations with office-based workforces having to …

Remote workers admit to playing a significant part in increasing their company’s cybersecurity risks
The COVID-19 generation of remote workers are admitting to playing a significant part in increasing the cybersecurity risks facing their companies. An Opinium research shows …

IT leaders adapting to new challenges by prioritizing collaboration, cloud and security
CIOs and IT decision makers (ITDMs) are looking to maximize investments and drive innovation after a difficult year which raised the profile of IT leaders in driving critical …

Data breaches and network outages: A real and growing cost for the healthcare industry
One year into the COVID-19 pandemic, the Infoblox report reveals major challenges the healthcare industry faced as IT workers scrambled to secure protected health information …

Rapid increase in security tools causing alert fatigue and burn out
On average, enterprises maintain 19 different security tools, with only 22% of such tools serving as vital to primary security objectives, a ReliaQuest survey reveals. The …

3 in 4 companies have experienced account takeover attacks in the last year
The COVID-19 pandemic has accelerated cloud migration and digital transformation amongst 88% of companies and that 71% of Microsoft Office 365 deployments have suffered an …

Years-old MS Office, Word flaws most exploited to deliver malware
29% of malware captured was previously unknown – due to the widespread use of packers and obfuscation techniques by attackers seeking to evade detection, according to a HP …

Threat actors thriving on the fear and uncertainty of remote workforces
The pandemic’s work-from-home reality resulted in an unprecedented change for organizations as they fought to defend exponentially greater attack surfaces from cybercriminals …

Risk management in the digital world: How different is it?
Managing risk arising from remote work has largely been reactive, and risk managers have had to adapt to new digital threats that weren’t necessarily as prevalent when work …

Digital-first lifestyle opens consumers to potential risks during tax season
Consumers have faced a lot of change over the past year with the shift to a digital-first lifestyle, and tax season with increasing risks is no exception. McAfee’s 2021 …
Featured news
Resources
Don't miss
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do
- Product showcase: Secure digital and physical access with the Swissbit iShield Key 2