Proper password security falling short despite increase in online presence

While 92 percent of people know that using the same password or a variation is a risk, 65 percent still re-use passwords across accounts, drastically increasing the risks to their sensitive information, a LastPass report revealed. While consumers have … Continue reading Proper password security falling short despite increase in online presence

Corporate attack surface exploding as a result of remote work

74% of organizations attribute recent business-impacting cyberattacks to vulnerabilities in technology put in place during the pandemic. The data is drawn from a study of more than 1,300 security leaders, business executives and remote employees conduc… Continue reading Corporate attack surface exploding as a result of remote work

A multi-party data breach creates 26x the financial damage of single-party breach

Cyentia Institute and RiskRecon released a research that quantifies how a multi-party data breach impacts many organizations in today’s interconnected digital world. The study is based on an analysis of 897 multi-party breaches involving three or more … Continue reading A multi-party data breach creates 26x the financial damage of single-party breach

Implementing risk quantification into an existing GRC program

With a myriad of risks and limited security budgets, how do organizations decide which projects to prioritize? Many governance, risk management and compliance (GRC) professionals believe risk quantification is the answer. Because risk-free operations d… Continue reading Implementing risk quantification into an existing GRC program

Protecting IoT devices requires a DNS-based solution

IoT devices are fast becoming an everyday part of our lives. Whether it be in the role they play in manufacturing and industry or powering the appliances in our own homes, it’s clear that IoT devices provide new and efficient ways of working and … Continue reading Protecting IoT devices requires a DNS-based solution

Consumers taking action to protect themselves online, though confidence is low

68% of consumers claim to be doing more to protect themselves from online fraud and identity theft than a year ago, according to a Trulioo research. The research found 76% of people feel that they’re at greater risk from online fraud than they were 12 … Continue reading Consumers taking action to protect themselves online, though confidence is low

SaaS applications investment growing despite underutilization of app licenses by employees

Business investment in SaaS applications continues to climb despite widespread underutilization of app licenses by employees. According to Productiv’s report, on average only 45% of company apps are being used on a regular basis. The data also shows 56… Continue reading SaaS applications investment growing despite underutilization of app licenses by employees

Leveraging AI and automation to identify sensitive data at scale

In this interview with Help Net Security, Apoorv Agarwal, CEO at Text IQ, talks about the risk of unstructured data for organizations and the opportunity to leverage AI and automation to identify sensitive data at scale. You say that, as organizations … Continue reading Leveraging AI and automation to identify sensitive data at scale

Leveraging AI and automation to identify sensitive data at scale

In this interview with Help Net Security, Apoorv Agarwal, CEO at Text IQ, talks about the risk of unstructured data for organizations and the opportunity to leverage AI and automation to identify sensitive data at scale. You say that, as organizations … Continue reading Leveraging AI and automation to identify sensitive data at scale

Microsoft Power Apps data exposure: Prioritizing sensitive data with secure configuration settings

Security misconfigurations are one of the most common gaps hackers look to exploit. One bad configuration setting in a popular cloud platform can have far-reaching consequences, allowing threat actors to access an abundance of valuable, personal inform… Continue reading Microsoft Power Apps data exposure: Prioritizing sensitive data with secure configuration settings