How can we protect ourselves against fake news and manipulation?

The internet has revolutionized our lives – whether in terms of working, finding information or entertainment, connecting with others, or shopping. The online world has made many things easier and opened up previously unimaginable opportunities. … Continue reading How can we protect ourselves against fake news and manipulation?

Consumers vastly misjudge the vulnerability of their home networks

Internet users in the United States vastly underestimate how often their home networks are targeted by cyber threats. That’s one of the key findings of a new Comcast report. Cyber threats growing numerous and complex Since January, nearly six billion c… Continue reading Consumers vastly misjudge the vulnerability of their home networks

Network traffic and consumption trends in 2020

As COVID-19 lockdown measures were implemented in March-April 2020, consumer and business behavioral changes transformed the internet’s shape and how people use it virtually overnight. Many networks experienced a year’s worth of traffic growth (30-50%)… Continue reading Network traffic and consumption trends in 2020

Employees increasingly masking online activities

This year’s shift to a near 100% WFH workforce by the Global 5000 has significantly changed the behaviors of trusted insiders, a DTEX Systems report reveals. Key findings include a 450% increase in employees circumventing security controls to intention… Continue reading Employees increasingly masking online activities

Over half of organizations were successfully phished in 2019

Nearly 90 percent of global organizations were targeted with BEC and spear phishing attacks in 2019, reflecting cybercriminals’ continued focus on compromising individual end users, a Proofpoint survey reveals. Seventy-eight percent also reported that … Continue reading Over half of organizations were successfully phished in 2019

Reducing Investigation Time: How to Quickly Parse True Positives

In the world of security operations, quickly and accurately investigating security incidents is paramount. As a result, filtering out the non-consequential incidents from the consequential incidents helps reduce the investigative time for the secu… Continue reading Reducing Investigation Time: How to Quickly Parse True Positives

Upfront transparency of data use is key for greater consumer acceptance of AI devices

The advancement of artificial intelligence (AI) relies heavily on the need for higher levels of intelligence to better predict, suggest and adapt to changing user behaviors. But privacy and security will remain a major concern for users until better me… Continue reading Upfront transparency of data use is key for greater consumer acceptance of AI devices

Conditional Access Establishes Trust In the Network

Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more advanced and sophisticated in their techniques, the global threat is increasing. At a recent I… Continue reading Conditional Access Establishes Trust In the Network

74% of Americans Are Clueless about Facebook’s Data Collection Algorithm, Survey Says

Americans don’t know much about Facebook and how its algorithm works, according to a survey from Pew Research Center conducted on 963 US Facebook users. The new study found that 74 percent of Facebook users in the US did not know that Facebook co… Continue reading 74% of Americans Are Clueless about Facebook’s Data Collection Algorithm, Survey Says