7 tips to strengthen online security

A lightbulb. We can connect a lightbulb in our house to the internet in case we need to turn the lights on or off while we’re away – or if we’re too lazy to walk to the light switch. The more lightbulbs, devices, apps and online services we use and connect with on a daily […]

Cisco Cyber-Security Report Finds Server Threats Increased in 2016

Security breaches aren’t just a nuisance. They can also have real financial impact on the organizations that are exploited. That’s one of the many high-level findings from the Cisco 2017 Annual Cybersecurity Report (ACR). The massive 110-page report provides insights from Cisco’s own research efforts as well as a survey that received responses from 3,000 […]

Companies Are Ill-Prepared for Cyber-Attacks

A recent survey reveals that most organizations are not prepared for outsider attacks, data vulnerability, insider sabotage, user errors and phishing. It also explores security concerns when migrating to the cloud and reports that IT-decision-makers fear for their jobs. Read/see the slide show explaining how companies are still ill-prepared for dealing with cyber attacks on […]

Security and Privacy Concerns Dog the Cloud

Security and privacy of data and systems in the cloud remain a top worry for the majority of IT professionals worldwide, according to a new survey. Furthermore, unauthorized access, malware and DoS attacks are the top three cloud security concerns today. Read/see the slideshow explaining how security and privacy issues continue to dog cloud adaptation […]

A Look Into Cyber Security

Network security in cyberspace is never far from the headlines. When it does reach the headlines, it’s never good news. Here are just a few famous – or infamous – security breaches of the not-too-distant past, even though they might seem like ancient history by now: Target, Adobe, TJX, Home Depot, Sony Playstation, Heartland, Epsilon. […]

How to eliminate insider threats

For years, the primary security objective has been to protect the perimeter—the focus on keeping outsiders from gaining access and doing harm. But statistics prove that more risk exists within an organization. Indeed, many compliance regulations require monitoring of systems to identify and eliminate insider threat. Read/see the slideshow explaining how companies can eliminate the […]

Data Breaches Affect Customer Loyalty

Online security is full of holes, according to a recent survey of 9,000 consumers in the United States and 10 other countries. Most consumers who are active online—nearly six out of 10— believe they will be a victim of a data breach at some point. Read/see the slide show explaining how the data breaches affect […]

7 Common Reasons Companies Get Hacked

Businesses suffering from security breaches span all sizes and industries, but they often make the same mistakes. Many cyberattacks in 2016 could be attributed to similar root causes. To be fair, security pros continue to face the same challenges, explains Diana Kelley, global executive security advisor at IBM. The most common causes behind major breaches can […]

Why Cyber-Security Strategies Are Falling Short

While organizations around the world are more confident than ever that they can predict and detect cyber-attacks, they’re still falling short on investments and plans geared toward recovering from a breach. Such is the double-edged finding of EY’s 19th annual Global Information Security Survey, “Path to Cyber-Resilience: Sense, Resist, React.” Read/see the slideshow explaining why […]

8 Boldest Security Predictions For 2017

The end of the year may mean ugly sweaters and epic office holiday parties for some. But for us here at Dark Reading, nothing signals winter solstice more certainly than an email inbox stuffed full of IT security predictions for the coming year. Read/see the slideshow explaining the 8 boldest security predictions for 2017 on […]