A new report from Zafran Security shows that enterprise risk management is shifting from volume to value, and from patching […]
Category: cybersecurity
Identity verification shifts in 2025 and what they mean for business and consumers [Q&A]
Generative AI is already defeating traditional identity verification (IDV) methods like knowledge-based authentication, 2FA, and more. This shift is likely […]
Most enterprise hybrid Active Directory environments have critical vulnerabilities
A new survey of more than 1,000 IT and security professionals carried out for Cayosoft finds that 88 percent of […]
Credential theft escalates as threat actors use stealthier tactics
Cybercriminals are pivoting to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises have declined. These are […]
New watchdog platform designed to protect enterprise AI deployments
As enterprises turn to increasingly sophisticated AI applications and agentic AI workflows, the large cloud footprint required to support such […]
Flawed phone apps could risk enterprise data
Analysis of over 17,000 enterprise-used mobile apps by Zimperium zLabs finds that 92 percent of all apps and 56 percent […]
Could this be the end of CVE? And what does it mean for cybersecurity?
The CVE (Common Vulnerabilities and Exposures) database is widely used across many cybersecurity tools, allowing the tracking of vulnerabilities. The […]
Microsoft vulnerabilities hit a record high in 2024
The latest annual Microsoft Vulnerabilities Report from BeyondTrust, reveals a record-breaking number of reported vulnerabilities last year. Total vulnerabilities reached […]
Browser extensions leave enterprises open to attack
Despite being present on virtually every employee’s browser, extensions and plug-ins are rarely monitored by security teams or controlled by […]
Less than a third of companies consistently meet compliance standards
New research shows that only 29 percent of all organizations say their compliance programs consistently meet internal and external standards. […]
