Companies unprepared to deal with mobile attacks, synthetic identity fraud, CCPA compliance
There is a growing impact of large-scale data breaches and fraud on consumer trust and the critical need for businesses to balance the digital consumer experience with strong …
Security pros like their job, yet many struggle with burnout and work-life balance
There is a persistent gap among cybersecurity professionals regarding gender and diversity, but also challenges with work-life balance. Lack of diversity Among the security …
As car manufacturers focus on connectivity, hackers begin to exploit flaws
Car manufacturers offer more software features to consumers than ever before, and increasingly popular autonomous vehicles that require integrated software introduce security …
MSPs face increased risks and opportunities to rethink cybersecurity
Managed service providers (MSPs) and their small-and medium-sized business (SMB) customers lack the tools and resources needed to sufficiently defend against rising …
WAV files spotted delivering malicious code
Attackers have embedded crypto-mining and Metasploit code into WAV audio files to stymie threat detection solutions. “All WAV files discovered adhere to the format of a …
5 things security executives need to know about insider threat
Insider threat is, unfortunately, an issue that has not yet received sufficient priority. According to the 2018 Deloitte-NASCIO Cybersecurity Study, CISOs’ top …
ICS cybersecurity investment should be a priority in protecting operations from disruption
93% of ICS security professionals are concerned about cyberattacks causing operational shutdown or customer-impacting downtime, according to a Tripwire survey. In an effort to …
Cybercrime is maturing, shifting its focus to larger and more profitable targets
Cybercrime is continuing to mature and becoming more and more bold, shifting its focus to larger and more profitable targets as well as new technologies. Data is the key …
Internal user mistakes create large percentage of cybersecurity incidents
Internal user mistakes created the largest percentage of cybersecurity incidents over the past twelve months (80%), followed by exposures caused by poor network system or …
The 5 biggest examples of executive threats and how to prevent them
Many executives focus their security efforts and budgets solely on physical threats, but attacks targeting an executive’s digital presence can be just as dangerous. …
Cyber risks are the top concern among businesses of all sizes
Cyber risks are the top concern among businesses of all sizes for the first time since the Travelers Companies’ survey began in 2014. Of the 1,200 business leaders who …
How important is packet capture for cyber defense?
Organizations using full packet capture are better prepared to battle cyber threats, according to an Enterprise Management Associates (EMA) report. Visibility and accuracy of …
Featured news
Sponsored
Don't miss
- Cybersecurity is a fundamental component of patient care and safety
- DockerSpy: Search for images on Docker Hub, extract sensitive information
- How AI and zero trust are transforming resilience strategies
- Cybersecurity jobs available right now: September 11, 2024
- eBook: Keep assets secure after cloud migration