A look at the top threats inside malicious emails

Web-phishing targeting various online services almost doubled during the COVID-19 pandemic: it accounted for 46 percent of the total number of fake web pages, Group-IB reveals. Ransomware, the headliner of the previous half-year, walked off stage: only… Continue reading A look at the top threats inside malicious emails

80% of businesses expect IT budgets to grow or remain steady in 2021

The global COVID-19 crisis is a catalyst for change, spurring businesses to continue to invest in technology to support and secure a remote workforce, despite slowing corporate revenue growth resulting from the pandemic, a Spiceworks Ziff Davis study r… Continue reading 80% of businesses expect IT budgets to grow or remain steady in 2021

Cybercriminals moved quickly to capitalize on the COVID-19 outbreak using malicious emails

While the COVID-19 outbreak has disrupted the lives and operations of many people and organizations, the pandemic failed to interrupt onslaught of malicious emails targeting people’s inboxes, according to an attack landscape update published by F-Secur… Continue reading Cybercriminals moved quickly to capitalize on the COVID-19 outbreak using malicious emails

Whitepaper: Mobile banking regulations, threats and fraud prevention

The usage of banking services through a mobile app has quickly been embraced by consumers. At the end of 2019, 74% of the UK and 75% of the US people used mobile devices to manage their finances. To stay ahead of the competition, banks have developed m… Continue reading Whitepaper: Mobile banking regulations, threats and fraud prevention

Week in review: Zerologon PoCs released, five steps to recover from ransomware, CISOs’ golden opportunity

Here’s an overview of some of last week’s most interesting news, reviews and articles: Most people ignore QR code security concerns QR codes are rising in popularity and use, according to a consumer sentiment study by MobileIron. Sixty-four… Continue reading Week in review: Zerologon PoCs released, five steps to recover from ransomware, CISOs’ golden opportunity

Justifying your 2021 cybersecurity budget

Sitting in the midst of an unstable economy, a continued public health emergency, and facing an uptick in successful cyber attacks, CISOs find themselves needing to enhance their cybersecurity posture while remaining within increasingly scrutinized bud… Continue reading Justifying your 2021 cybersecurity budget

Incident management tools and processes insufficient to enable innovation

Enterprise digital transformation budgets continue to increase despite a recession, developers find it challenging to innovate and standard incident management tools and processes hinder digital service resilience, an xMatters research reveals. Digital… Continue reading Incident management tools and processes insufficient to enable innovation

Improving privacy of a global genomic data sharing network

A Case Western Reserve University computer and data sciences researcher is working to shore up privacy protections for people whose genomic information is stored in a vast global collection of vital, personal data. Erman Ayday pursued novel methods for… Continue reading Improving privacy of a global genomic data sharing network

What’s causing uncertainty about election security?

Confidence levels in securing the election are low, and declining, according to an ISACA survey of more than 3,000 IT governance, risk, security and audit professionals in the US. While federal, state and local governments continue to harden election i… Continue reading What’s causing uncertainty about election security?

Ongoing and initial costs top list of barriers to 5G implementation

5G is set to deliver higher data transfer rates for mission-critical communications and will allow massive broadband capacities, enabling high-speed communication across various applications such as the Internet of Things (IoT), robotics, advanced anal… Continue reading Ongoing and initial costs top list of barriers to 5G implementation