• These are the most in-demand skills in cybersecuri...

    • 1:34 PM, Jul 27

    “Anyone looking to break into the cybersecurity industry should focus more on in-demand skills and less on the formal education and certification. This is according to a new research report from the SANS Institute, a Bethesda-based security research and training firm.” – read more at ITProPortal!

    READ MORE
  • 5 most common ways criminals perform identity thef...

    • 1:33 PM, Jul 27

    “To steal your ID, cybercriminals simply need to catch you unawares. A momentary lapse of concentration and the information they need could be handed over without protest, almost subconsciously. Like all scams, ID theft works when you least expect it.” – read more at TechRadar!

    READ MORE
  • Security teams are getting waylaid by mundane task...

    • 2:03 PM, Jul 24

    “With a quarter of all security alerts generated in Security Operations Centers (SOC) turning out to be false positives, security analysts are finding large portions of the day is wasted. This is according to a new report from SIRP Labs, based on a poll of 250 security analysts, which states that that the average enterprise

    READ MORE
  • Public cloud revenue to grow 6.3% in 2020 — Gart...

    • 2:02 PM, Jul 24

    “Public cloud revenue is forecast to grow 6.3% in 2020 to total $257.9 billion, up from $242.7 billion in 2019, according to Gartner. Within the worldwide public cloud services market, Desktop-as-a-Service (DaaS) is expected to have the most significant growth in 2020, increasing 95.4% to $1.2 billion.” – read more at InformationAge!

    READ MORE
  • New cyber threats appeared at a rate of 375 per mi...

    • 1:40 PM, Jul 23

    “According to a new report from security firm McAfee, although the the number of new malware strains fell in Q1, the total volume of malicious samples identified grew significantly. The company claims to have seen an average of 375 new threats every minute, with total attack volume growing 27% percent over the past four quarters.”

    READ MORE
  • How do cybercriminals secure cybercrime?

    • 1:37 PM, Jul 23

    “Over the past five years, increased use and abuse of compromised assets has formed a whole new market. There are varied types of underground hosting and associated services used by cybercriminals to operate their businesses, including bulletproof hosting, VPNs, anonymizers, and DDoS protection.” – read more at Help Net Security!

    READ MORE
  • Almost half of employees have made mistakes that l...

    • 2:10 PM, Jul 22

    “Employee error is still the number one source of cybersecurity incidents, according to a new report from Tessian. Polling 2,000 employees in the UK and US, the firm found that stress and distraction are the main reasons employees make mistakes that lead to security breaches.” – read more at ITProPortal!

    READ MORE
  • Remote working: We’re stressed and distracte...

    • 2:08 PM, Jul 22

    “As the great global remote-working experiment for many office workers approaches its fifth month, employees are still struggling to adjust to both the practical and behavioural changes that the sudden change has called for. Email security firm Tessian found that increased levels of stress reported by workers in recent months meant it was more likely

    READ MORE
  • UK second most targeted by significant cyber attac...

    • 1:36 PM, Jul 21

    “Specops analysed data from the Centre for Strategic and International Studies (CSIS), and found that the US experienced 156 significant cyber attacks between May 2006 and June 2020, while the UK was infiltrated by 47 within the same period.” – read more at Information Age!

    READ MORE
  • Internet security is improving, but exposures stil...

    • 1:35 PM, Jul 21

    “Vulnerabilities and exposures still plague the modern internet even with the increasing adoption of more secure alternatives to insecure protocols, like Secure Shell (SSH) and DNS-over-TLS (DoT). “We were surprised to see that recent incidents appear to have had no obvious effect on the fundamental nature of the internet, however it is possible that we

    READ MORE

Sign up for the Newsletter!

Read privacy statement here

Latest Posts

Categories

Tags