Insider security incidents remain a problem for business, yet many organizations struggle with limited budgets, minimal talent resources, and tools […]
Category: cybersecurity
Why are virtual CISOs becoming so popular? Because organizations need them [Q&A]
It’s becoming common in the cybersecurity industry to encounter two situations that are equally untenable. On the one hand, the […]
Mobile-first phishing attacks surge as specific capabilities are targeted
As organizations increasingly rely on mobile devices for business operations, including multi-factor authentication and mobile-first applications, mobile phishing poses a […]
Cybersecurity professionals not happy in their jobs
Only a third of cybersecurity professionals would recommend their employer according to a new study carried out by IANS Research […]
Public sector professionals worried about the security risks of AI
AI adoption is gaining momentum in the public sector as elsewhere, with benefits like predictive analytics and issue detection, but […]
Microsoft’s Majorana 1 quantum chip could break encryption and expose your data to hackers
Microsoft is moving closer to quantum computing supremacy with its Majorana 1 chip, a development that could change cybersecurity forever. […]
Strengthening cyber resilience — cautious collaboration between organizations and third-party vendors needed
Ransomware is continuously on the rise. Despite multiple major law enforcement actions against ransomware groups over the past year, there […]
Malware-as-a-Service accounts for 57 percent of all threats
A new report from Darktrace reveals that Malware-as-a-Service (MaaS) is now responsible for 57 percent of all cyber threats to […]
Software supply chain attacks and how to deal with them [Q&A]
Increased use of open source and third-party code leaves organizations open to more attacks on the software supply chain. Open […]
Companies block GenAI but workers still use it
A new report from Fortanix finds that 97 percent of companies block or restrict GenAI usage, and 89 percent of […]
