Ambitious cybersecurity regulations leave companies in compliance chaos

While the goal of cybersecurity regulations is to bring order among organizations and ensure they take security and risks seriously, the growing number of regulations has also introduced a considerable set of challenges that organizations and their lea… Continue reading Ambitious cybersecurity regulations leave companies in compliance chaos

80% of Critical National Infrastructure Companies Experienced an Email Security Breach in Last Year

The scale of the potential disruption from a successful attack on CNI is all too tempting for cyber attackers. Continue reading 80% of Critical National Infrastructure Companies Experienced an Email Security Breach in Last Year

Half of enterprises suffer breaches despite heavy security investments

Data breaches have become an increasingly severe threat, with recent reports highlighting a surge in their frequency and cost. Understanding the latest trends and statistics surrounding data breaches is essential for developing effective strategies to … Continue reading Half of enterprises suffer breaches despite heavy security investments

SOCI Act 2024: Thales Report Reveals Critical Infrastructure Breaches in Australia

Thales’ 2024 Data Threat Report reveals key insights for Australian critical infrastructure under the SOCI Act 2024. Our exclusive interview with Erick Reyes reveals the security impacts. Continue reading SOCI Act 2024: Thales Report Reveals Critical Infrastructure Breaches in Australia

Thales Passwordless 360° enables organizations to improve their identity management practices

Thales announced Passwordless 360°, a new concept for passwordless authentication which offers Thales customers the broadest coverage of passwordless function across multiple types of users and assurance levels. Passwordless 360° has the flexibility to… Continue reading Thales Passwordless 360° enables organizations to improve their identity management practices

Find out which cyber threats you should be concerned about

This article includes excerpts from various reports that offer statistics and insights into the current cyber threat landscape. Human error still perceived as the Achilles’ heel of cybersecurity Proofpoint | 2024 Voice of the CISO | May 2024 … Continue reading Find out which cyber threats you should be concerned about

Cybercrime stats you can’t ignore

In this article, you will find excerpts from various reports that offer stats and insights about the current cybercrime landscape. Behavioral patterns of ransomware groups are changing GuidePoint Security | GRIT Q1 2024 Ransomware Report | Ap… Continue reading Cybercrime stats you can’t ignore

Anticipating and addressing cybersecurity challenges

In this Help Net Security round-up, we present excerpts from previously recorded videos in which security experts talk about how increased adoption of cloud technology, remote work, and the proliferation of IoT devices present significant challenges fo… Continue reading Anticipating and addressing cybersecurity challenges

Bots dominate internet activity, account for nearly half of all traffic

49.6% of all internet traffic came from bots in 2023, a 2% increase over the previous year, and the highest level Imperva has reported since it began monitoring automated traffic in 2013. For the fifth consecutive year, the proportion of web traffic as… Continue reading Bots dominate internet activity, account for nearly half of all traffic