What 50 companies got wrong about cloud identity security

Most organizations still miss basic identity security controls in the cloud, leaving them exposed to breaches, audit failures, and compliance violations. A new midyear benchmark from Unosecur found that nearly every company scanned had at least one hig… Continue reading What 50 companies got wrong about cloud identity security

Phishing campaign targets U.S. Department of Education’s G5 portal

A new phishing campaign is targeting users of the U.S. Department of Education’s G5 portal, a site used by educational institutions and vendors to manage grants and federal education funding. Threat researchers at BforeAI uncovered a cluster of lookali… Continue reading Phishing campaign targets U.S. Department of Education’s G5 portal

The fraud trends shaping 2025: Pressure builds on online retailers

Fraud is growing faster than revenue in eCommerce. That’s one of the first things PwC and Forter point out in their new report, and it’s a wake-up call for online retailers. Fraud is rising faster than ever Right now, eCommerce leaders are dealing with… Continue reading The fraud trends shaping 2025: Pressure builds on online retailers

Product showcase: iStorage diskAshur PRO3

Data breaches seem to pop up in the news every other week, so it’s no surprise that keeping sensitive information safe has jumped to the top of the priority list for just about every industry. Hardware-encrypted drives like the iStorage diskAshur PRO3 … Continue reading Product showcase: iStorage diskAshur PRO3

Are your employees using Chinese GenAI tools at work?

Nearly one in 12 employees are using Chinese-developed generative AI tools at work, and they’re exposing sensitive data in the process. That’s according to new research from Harmonic Security, which analyzed the behavior of roughly 14,000 end use… Continue reading Are your employees using Chinese GenAI tools at work?

Tired of gaps in your security? These open-source tools can help

When it comes to spotting threats, security teams need tools that can pull data from all over and make it easier to analyze. In this article, we’ll take a look at some popular open-source tools that help with everything from log management to network a… Continue reading Tired of gaps in your security? These open-source tools can help

Most cybersecurity risk comes from just 10% of employees

A new report from Living Security and the Cyentia Institute sheds light on the real human element behind cybersecurity threats, and it’s not what most organizations expect. The Risky Business: Who Protects & Who Puts You at Risk report analyzes da… Continue reading Most cybersecurity risk comes from just 10% of employees