The DHS body’s primary focus will be on addressing vulnerabilities in the commonly used log4j software library, but will also incorporate findings on the ‘SolarWinds’ hack....
Phishing emails that mimic HR announcements or ask for assistance with invoicing get the most clicks from recipients, according to a study from F-Secure. The study, which included...
The Great Resignation has created more security challenges for cybersecurity teams. While employees are quitting their jobs in huge waves following the COVID-19 pandemic for better...
Cybersecurity professionals say the board needs subpoena authority in order to be effective. Rob Silvers, the Department of Homeland Security’s under secretary for strategy, policy and...
Organizations and enterprises that care about business continuity should have an established security program that needs to be reviewed on a regular basis. One of the...
Proofpoint released a report to identify the costs and trends associated with negligent, compromised, and malicious insiders. Notably, on average, impacted organizations spent $15.4 million annually on...
Insurers’ use of predictive analytics to fight fraud has reached an all-time high, according to an insurance fraud technology study by the Coalition Against Insurance Fraud and SAS....
More than 95,000 Americans were bilked over social media in 2021 resulting in losses approaching $1 billion. Be careful about lending that attractive new Facebook friend...
Xerox has addressed a vulnerability in its firmware that created a means for unauthenticated users to “remotely brick” some models of its network printers. The vulnerability (CVE-2022-23968) predominantly...
205 days. That’s now the average time security teams take to remediate critical cybersecurity vulnerabilities — nearly seven full months. Although the number of vulnerabilities continues to climb at a...