Tag "Cyber Threats"

Back to homepage
Industry Insights

Pressures impacting security pros are up, threats are turning up the heat

Findings show that a majority of IT and cybersecurity professionals experienced increased pressures in 2017 when compared to the previous year, driven largely by a steep rise in sophisticated malware,

Software

How security pros see the future of cryptocurrencies and cryptomining

“Security teams are fighting a multi-front battle to keep their organizations safe from cybercriminals,” commented Dr. Giovanni Vigna, Lastline and CTO. “The threats range from established attacks, such as ransomware, to

Hardware/Network

How to Stop Advanced Persistent Threats

An advanced persistent threat can be as scary as it sounds. Gone undetected in an enterprise, these network breaches can lead to fraud, intellectual property theft or a headline-grabbing data

Industry Insights

IT teams’ security fears should resonate strongly with the C-suite

Despite recurring headlines reporting high-level cyber attacks on organisations of various sizes, businesses are failing to protect themselves from escalating threats. The latest industry survey by ManageEngine, exploring UK-based IT

Hardware/Network

New Dept Of Energy Cybersecurity Strategy (Threat Sharing, Supply-Chain Risk Mgt., R&D, etc.)

The US Department of Energy released its Multi-Year Plan for Energy Sector Cybersecurity to help make US energy systems more resilient and secure. Also, the plan serves as a roadmap for the new Office of

Hardware/Network

Fighting Fire With Fire: AI’s Role in Cybersecurity

Last year, it was predicted by Gartner that Artificial Intelligence (AI) will be implemented in almost every new software product by 2020. As AI capabilities grow at a rapid pace, such technologies

Hardware/Network

Internet of Things: Who is watching you?

An overwhelming number of IT security professionals (85%) see a cyberattack on critical infrastructure happening in the next five years. Pwnie Express CEO Todd DeSisto says that figure is perhaps

Hardware/Network

Relying on legacy security technologies leaves you blind to IoT threats

As shadow IoT infiltrate organizations, the variety of risks and threats stemming from these devices put networks and data at risk, according to 802 Secure. IoT and IIoT (Industrial IoT) introduce new IoT networks

Industry Insights

Data Security Incidents Spike as Human Error Dominates

The number of data security incidents reported to the UK’s Information Commissioner’s Office (ICO) jumped 17% between the final three months of 2017 and the first quarter of 2018, according

Hardware/Network

Threat analytics: Keeping companies ahead of emerging application threats

Every application that is downloaded via an app store runs in a zero-trust environment. When a protected app is published to an official app store, an open loop of protection