Alert fatigue and burnout plaguing public cloud security
55% of IT professionals use three or more cloud providers and 57% have five or more cloud security tools, which leads to alert fatigue, as revealed by Orca Security. This …
Most businesses do not fully understand the threat bots pose
A report by Netacea found that while most businesses were aware that bots were an issue, many were confused about where attacks originate and what technologies and techniques …
Most organizations are unprepared to face a ransomware attack on Kubernetes
As many organizations are incresangly deploying Kubernetes into their mission-critical environments, not many have tools in place to protect against data loss incidents such …
Healthcare organizations need to step up their cybersecurity game
Protected Harbor’s whitepaper on healthcare cybersecurity offers insight into the most common threats targeting healthcare organizations, and what should be done to …
Both developers and attackers shifting to APIs
After analyzing some of the most interesting bot attacks throughout 2021, it’s clear that attackers have come to love APIs just as much as developers, Cequence Security …
The state of mobile security
A Zimperium report revealed that in 2021 threats have impacted 10 million mobile devices in at least 214 countries, with mobile malware being the most prevalent threat, …
How long does it take to develop cyber capabilities?
An Immersive Labs report uncovered the workforce cyber capabilities of cybersecurity, application security and crisis response teams. Analysis of 35,000 cybersecurity team …
What is threatening the financial sector?
According to a report from F-Secure, ransomware is the top threat for financial services organizations, with phishing, exposed remote desktop protocol (RDP) ports, and the …
Malicious web application requests climbed 88% between 2020 and 2021
According to a report released by Radware, between 2020 and 2021, the number of malicious web application requests climbed 88%, more than double the year-over-year growth rate …
When it comes to digital banking, consumers demand security
With consumers being digitally connected in almost all facets of their lives, they expect their banks’ offerings and their payment experiences to be digital too. Entrust …
Passwords are still the weakest link in an organization’s network
Password-related attacks are on the rise. Stolen user credentials including name, email and password were the most common root cause of breaches in 2021 with several …
The state of vulnerability management
An Edgescan report reveals that organizations are still taking nearly two months to remediate critical risk vulnerabilities, with the average mean time to remediate (MTTR) …
Featured news
Resources
Don't miss
- CISA warns about actively exploited Broadcom, Commvault vulnerabilities
- Marks & Spencer cyber incident linked to ransomware group
- Eyes, ears, and now arms: IoT is alive
- What’s worth automating in cyber hygiene, and what’s not
- Want faster products and stronger trust? Build security in, not bolt it on