80% of organizations experienced employees misusing and abusing access to business apps

Organizations continue to operate with limited visibility into user activity and sessions associated with web applications, despite the ever-present risk of insider threats and credential theft, a CyberArk research reveals. While the adoption of web ap… Continue reading 80% of organizations experienced employees misusing and abusing access to business apps

Younger generations care little about cybersecurity

SailPoint released a survey which aimed to identify gaps within organizations’ cybersecurity postures by analyzing workforce behaviors that blur work and personal lives, leading to security pitfalls. According to the findings, 59% of all workers are us… Continue reading Younger generations care little about cybersecurity

Organizations seldom prioritize cybersecurity over business outcomes

55% of large companies are not effectively stopping cyberattacks, finding and fixing breaches quickly, or reducing the impact of breaches, according to a research study from Accenture. Based on a survey of more than 4,700 executives globally, the study… Continue reading Organizations seldom prioritize cybersecurity over business outcomes

Fragmented approach to identity security management creates risk

One Identity released global survey findings that revealed a significant increase in digital identities on a global scale. This phenomenon – known as identity sprawl – has been driven by surges in user identities (internal, third parties, and customers… Continue reading Fragmented approach to identity security management creates risk

Employers must balance productivity and collaboration tools with security

Americans are more concerned about cybersecurity than ever before, according to Unisys. The survey found that concerns around internet security (including computer viruses and hacking) rose by 16% from 2020 to the highest level of U.S. internet securit… Continue reading Employers must balance productivity and collaboration tools with security

Regulation fatigue: A challenge to shift processes left

Recent high-profile supply chain attacks have heightened the need for increased regulation of the open-source community. In the U.S., for example, President Biden’s recent executive order asks government vendors to attest “to the extent practicab… Continue reading Regulation fatigue: A challenge to shift processes left

Despite increased cyber threats, many organizations have no defense plans in place

98% of U.S. executives report that their organizations experienced at least one cyber event in the past year, compared to a slightly lower rate of 84% in non-U.S. executives, according to a Deloitte survey. The pandemic leading to increased cyber threa… Continue reading Despite increased cyber threats, many organizations have no defense plans in place

Good security habits: Leveraging the science behind how humans develop habits

In this interview with Help Net Security, George Finney, CSO at Southern Methodist University, explains what good security habits are, how to successfully implement them and why are they important. He also talks about his book Well Aware and what inspi… Continue reading Good security habits: Leveraging the science behind how humans develop habits

Organizations making security trade-offs in the push to innovate

The vast majority of organizations are increasing their investment in application security this year, but they continue to struggle to fully embrace secure innovation. A market study released by Invicti Security examines how companies are contending wi… Continue reading Organizations making security trade-offs in the push to innovate

The first step to being cybersmart: Just start somewhere

When it comes to a subject as complex as cybersecurity, it’s easy to become a victim of decision paralysis. When company leaders and IT staff begin looking at their options around improving their security and discover hundreds of possible solutions, th… Continue reading The first step to being cybersmart: Just start somewhere