May 3, 2021
Via: Help Net Security35% of UK IT decision makers admitted that their remote workers have already knowingly put corporate data at risk of a breach in the last year according to an annual survey conducted by Apricorn. This is concerning given that over […]
December 15, 2020
Via: CSO OnlineJimmy Sanders has a long list of work to do, so he wants a security team that can handle the multitude of tasks ahead – from advancing his company’s zero trust security strategy to securing its cloud deployments to deploying […]
Threats & Malware, Vulnerabilities
August 7, 2020
Via: CIOGiven the global upheaval that COVID-19 has triggered, managing supply chain risk is top of mind for everyone. Improving forecast accuracy to lower risk is the sweet spot for machine learning (ML) applications in supply chains. ML is an AI […]
February 17, 2020
Via: CSO OnlineYou leave kerosene-soaked rags all around your house. You chain smoke. One day, while relaxing in front of an episode of CSI:Cyber, your hand slips and a lit cigarette sets your sofa on fire. Your house burns down. The insurance […]
January 10, 2020
Via: Threat PostWhen designed appropriately and measured objectively, metrics are an indispensable part of a mature security program. Solid metrics can help an organization measure and track risk and performance as well as make educated adjustments and decisions as required. While most […]
January 8, 2020
Via: Help Net SecurityA combination of job prospects, local amenities and other attractions is drawing more people to city living than ever before. Indeed, the UN estimates that by 2050 two-thirds of the global population will be living in cities, up from just […]
January 6, 2020
Via: Help Net Security2019 was a bad year for data security. By virtually every metric, it was the worst ever. According to the Ponemon Institute’s 2019 Cost of a Data Breach Report, the average cost of a data breach reached $3.92 million, the […]
December 6, 2019
Via: Help Net SecurityNotable regulatory compliance and risk challenges remain high in a number of key areas for U.S. banks and credit unions, according to the results of a Wolters Kluwer survey. Rising risk challenges for financial organizations This year’s survey generated a […]
October 16, 2019
Via: Security IntelligenceDoes ransomware respect the holiday season? With ransomware attacks attempted every 14 seconds, it’s not likely attackers take any days off. The threat of ransomware keeps growing, and in Q1 2019, researchers noted a 118 percent rise in malware strains […]
October 1, 2019
Via: Help Net SecurityThere’s an alarming scale of risks businesses are up against in a time when email is proving an open door for cybercriminals and malicious actors looking to disrupt, exploit and destroy businesses, according to Wire. The report is developed in […]
Mobile, Privacy protection, Threats & Malware, Vulnerabilities
September 17, 2019
Via: Hot for SecurityWhatsApp’s “Delete for Everyone” feature, meant to allow people to delete files they accidentally sent, works differently on iPhones than it does on Android phones, a researcher has warned. This discrepancy could place senders’ privacy at risk by leaving some […]
August 21, 2019
Via: Dark ReadingCybercriminals are increasingly taking aim at smaller organizations. This puts small and midsize businesses (SMBs) in a tough spot. Faced with a long list of cyberthreats, they also are operating with smaller budgets and staff constraints, both of which can […]
Mobile security, Network security, Security
July 25, 2019
Via: Security WeekBuilding upon existing 4G Long-Term Evolution (LTE) infrastructure, 5G is designed to improve bandwidth, capacity, and reliability of wireless broadband services. The technology is intended to meet increasing data and communication requirements, offering capacity for tens of billions of connected […]
June 25, 2019
Via: Help Net Security50% of large enterprises view third-party partners of any size as a cybersecurity risk, but only 14% have experienced a breach as the result of a small business partner, while 17% have been breached as the result of working with […]
May 24, 2019
Via: Help Net SecurityThe travel industry and its customers are increasingly the targets of cyberattacks as criminals seek to monetize highly valuable travel data, according to the new IBM Security research. Compounding the problem, a new survey conducted by Morning Consult on behalf […]
Access control, Application security, Cyber-crime, Identity theft, Network security, Security
April 24, 2019
Via: Help Net SecurityWorkers are comfortable sharing personal, sensitive and confidential information over chat platforms. They practice risky digital habits, and don’t care if their communications are leaked. Symphony Communication Services Workplace Confidential Survey, which polled over 1,500 workers in the U.S. and […]
April 16, 2019
Via: Help Net SecurityUnpatched vulnerabilities, along with growing network and application complexity pose an ongoing security risk which could threaten the security of enterprise IT networks. Analyzing the biggest security findings over the past year, Keysight has released the third annual security report […]
March 4, 2019
Via: Help Net SecurityIT decision makers are facing major challenges between dynamic adversaries, significant legislation and regulation requirements, business digital transformation needs, and a rapidly growing array of technology solutions. Ideally, business requirements would be the key motivator for an organization’s approach to […]
March 4, 2019
Via: TechRadarThe growth of smart IoT-connected gadgets may be causing a dramatic rise in the number of cyberattacks targeting both consumers and businesses alike. Security experts have warned that criminals are increasingly targeting smart home products which are worryingly sparse in […]
February 21, 2019
Via: Dark ReadingCompanies think their data is safer in the public cloud than in on-prem data centers, but the transition is driving security issues. More business-critical data is finding a new home in the public cloud, which 72% of organizations believe is […]