External attackers can penetrate most local company networks
In 93% of cases, external attackers can breach the organization’s network perimeter and gain access to local network resources, and it takes an average of two days to …
Developments that will define data governance and operational security in 2022
Satori shared its predictions for the near future of cloud-based transformation, detailing three major developments to watch for in the world of data governance and …
Enterprise data loss prevention market to reach $6.265 billion by 2026
The global enterprise data loss prevention market is projected to grow at a CAGR of 21.03% to reach $6.265 billion by 2026, from $1.647 billion in 2019, according to …
4 practical strategies for Log4j discovery
For security teams scrambling to secure their organizations against Log4j exploitation, one of the first and most challenging tasks is understanding where Log4j exists within …
How to avoid “festive fraud” during the holiday season
The year-end holiday season is a time for celebration – a chance to decorate homes, splurge on gifts and gather with family and friends. It’s also a time when the scammers …
Manufacturers of IoT devices should step up when it comes to security
With significant growth projected in the global IoT market over the next 6 years, the need to subsequently secure devices at the edge from attacks, safe and secure through the …
Web app attacks are skyrocketing, it’s time to protect APIs
Web app attacks against UK businesses have increased by 251% since October 2019, putting both organizations and consumers at risk, an Imperva reserach reveals. In a study of …
Five megatrends for 5G mmWave for 2022 and beyond
It’s been a tumultuous year for 5G as wireless carriers scrambled to deploy their networks at mid-band and increasingly millimeter-wave frequencies, and the trend will …
Week in review: Log4j new vulnerabilities, Microsoft patch bypass, 2022 e-commerce threat trends
Here’s an overview of some of last week’s most interesting news, articles and interviews: The Log4j saga: New vulnerabilities and attack vectors discovered The …
New infosec products of the week: December 24, 2021
Here’s a look at the most interesting products from the past week, featuring releases from BlackBerry, Box, and Veriff. Veriff’s metaverse identity verification solution …
Bots are stealing Christmas!
Kasada released new data on the latest fraud and malicious automation trends, revealing increased threats during the holidays; rising attacks by bots; and the discovery of a …
The retail sector needs to know when and not if it will be hacked
This year, major chains like Target and Walmart closed on Thanksgiving, which resulted in a 90.4 percent dip in visits to brick-and-mortar stores when compared to 2019. This …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online