
Most businesses believe stronger data protection policies will lead to fewer breaches
In light of new data privacy legislations, a new Webroot report looks at how businesses in the U.S., U.K., and Australia are adjusting to new data security measures in order …

Sometimes employees follow cybersecurity best practices beyond company policies
Nearly two-thirds (64%) of employees use a company-approved device for work. However, less than half (40%) of those who use a personal device are regulated when using that …

Phishers increasingly targeting cloud storage and SaaS
The Anti-Phishing Working Group (APWG) has been tracking notable increases in phishing campaigns that target SAAS/webmail providers, as well as increased attacks on financial …

Rising concerns about managing risk and proving compliance in the medical device industry
Perforce Software released the results of a global survey of medical device professionals. Key findings show increased concerns for mitigating risk and proving compliance …

Are security pros happy with their jobs and salaries?
Do security professionals like their jobs and would they recommend a career in cyber security to those looking into one? What do they like about their jobs and what motivates …

White House eliminates Cybersecurity Coordinator role
The White House has eliminated the role of Cybersecurity Coordinator, generally viewed as the top cybersecurity role in the US government. The decision was made by John …

Companies ditch data as GDPR deadline approaches
A new study from IBM reveals that nearly 60 percent of organizations surveyed are embracing the GDPR as an opportunity to improve privacy, security, data management or as …

25% of companies affected by cloud cryptojacking
Cryptojacking has unquestionably gone mainstream. Despite heavy media and industry attention, organizations are struggling to meet compliance requirements in public cloud …

How consumers are embracing IoT
A CSG survey, which polled more than 2,000 consumers between the ages of 18 and 64, evaluated consumer understanding, usage and sentiment about current and future IoT …

Insider threat blind spot enables employee revenge attacks
Based on threat assessments from global organizations in public and private sector industries, Dtex Systems determined there are active insider threats in all assessed …

The pace of vulnerability disclosure shows no signs of slowing
Unless the pace of vulnerability disclosure slows down in the coming quarters, we are looking at yet another record-breaking year, according to Risk Based Security’s …

Automating web app testing to secure your environment
In this podcast recorded at RSA Conference 2018, Dave Ferguson, Director, Product Management for Web Application Security at Qualys, talks about the challenges and benefits of …
Featured news
Resources
Don't miss
- Attackers breached ConnectWise, compromised customer ScreenConnect instances
- Product showcase: Smarter pentest reporting and exposure management with PlexTrac
- CISO 3.0: Leading AI governance and security in the boardroom
- Review: Metasploit, 2nd Edition
- Security awareness training isn’t stopping breaches. Can AI help?