Image-based phishing tactics evolve

While 70% of organizations feel their current security stacks are effective against image-based and QR code phishing attacks, 76% were still compromised in the last 12 months, according to IRONSCALES and Osterman Research. IT pros are highly aware of e… Continue reading Image-based phishing tactics evolve

Balancing AI’s promise with privacy and intellectual property concerns

Organizations increasingly integrate AI technologies into their cybersecurity architectures to enhance detection, response, and mitigation capabilities. One of the key strengths of AI in cybersecurity lies in its ability to predict and prevent attacks … Continue reading Balancing AI’s promise with privacy and intellectual property concerns

Companies need to rethink how they implement identity security

More than 80% of organizations have experienced an identity-related breach that involved the use of compromised credentials, half of which happened in the past 12 months, according to Silverfort and Osterman Research. Lack of visibility into the identi… Continue reading Companies need to rethink how they implement identity security

Cybercriminals turn to AI to bypass modern email security measures

Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern email security systems use AI to counter these attacks, according to Perception Point and Osterma… Continue reading Cybercriminals turn to AI to bypass modern email security measures

Organizations invest in AI tools to elevate email security

To counteract new and emerging threat methods enhanced by artificial intelligence, specialized email security vendors are leveraging a synergy of AI and human insights to enhance email security, according to IRONSCALES and Osterman Research. Cybercrimi… Continue reading Organizations invest in AI tools to elevate email security

Organizations need to re-examine their approach to BEC protection

BEC attacks are growing year over year and are projected to be twice as high as the threat of phishing in general, according to IRONSCALES and Osterman Research. 93% of organizations experienced one or more of the BEC attack variants in the previous 12… Continue reading Organizations need to re-examine their approach to BEC protection

Threat actors extend attack techniques to new enterprise apps and services

Perception Point announced the publication of a report, “The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-Based Channels“, which evaluates the responses of security and IT decision-makers at large enterprises and reveals numerous si… Continue reading Threat actors extend attack techniques to new enterprise apps and services

Businesses lack visibility into run-time threats against mobile apps and APIs

A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance of apps versus the level of focus and resources applied to protect organizati… Continue reading Businesses lack visibility into run-time threats against mobile apps and APIs

Visibility into runtime threats against mobile apps and APIs still lacking

A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance of apps versus the level of focus and resources applied to protect organizati… Continue reading Visibility into runtime threats against mobile apps and APIs still lacking

Security pros increasingly plan to adopt MDR services in the next 12 months

The managed cybersecurity services market is undergoing a significant shift, according to a new survey conducted by Osterman Research. As organizations struggle with too many alerts, too few security analysts, and increasingly complex security stacks, … Continue reading Security pros increasingly plan to adopt MDR services in the next 12 months