Top

LATEST PUBLICATIONS



Global spending on security solutions to reach $133.7 billion in 2022

October 8, 2018

Worldwide spending on security-related hardware, software, and services is forecast to reach $133.7 billion in 2022, according to IDC. Although spending growth is expected to gradually slow over the 2017-2022 forecast period, the market will still deliver a compound annual […]


Mitigate Risk From Malicious and Accidental Insiders

September 20, 2018

When we hear the term “insider trading” most people think of the illegal practice of trading a public company’s stock based on material, non‐public information. The image of Michael Milken, Ivan Boesky or Martha Stewart may come to mind. Yet […]


Here’s Why Business Email Compromise Is Still Driving Executive Identity Theft

September 12, 2018

All it took was access to a lawyer’s email, and suddenly, almost $532,000 was in the wrong hands. This business email compromise (BEC) scam began simply: A criminal in Los Angeles named Ochenetchouwe Adegor Ederaine, Jr. gained access to a […]


Hacker, Network security

Russian Hacking Groups Intersect in Recent Cyberattacks

October 11, 2018

Via: Dark Reading

Two different hacking teams best known as Turla and Fancy Bear employed the same stealthy attack method in an unusual overlap of hacking activity. A rare overlap in malware delivery and targets recently between two separate and traditionally very different […]


Network security

Top cybersecurity facts, figures and statistics for 2018

October 11, 2018

Via: CSO Online

Looking for hard numbers to back up your sense of what’s happening in the cybersecurity world? We dug into studies and surveys of the industry’s landscape to get a sense of the lay of the land—both in terms of what’s […]


Network security

What is enterprise risk management? How to put cybersecurity threats into a business context

October 11, 2018

Via: CSO Online

Enterprise risk management (ERM) is the process of assessing risks to identify both threats to a company’s financial well-being and opportunities in the market. The goal of an ERM program is to understand an organization’s tolerance for risk, categorize it, […]


Cloud security

How Shared Pools of Cloud Computing Power Are Changing the Way Attackers Operate

October 10, 2018

Via: Threat Post

Cloud computing is creating new challenges among security professionals as attackers embrace the “as-a-service model”, giving unsophisticated cybercriminals a leg up in carrying out attacks. The transformation from racks of physical hardware hosting sites and services to cloud computing has […]