This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
An Internet Society report finds that most organizations do not comply with existing global privacy regulations and are not ready for additional regulations that are going into effect in 2020.
Research finds major challenges monitoring and managing privileged user access and activities, with 70 percent of respondents indicating users likely to access sensitive or confidential data without a business need.
China’s National Computer Network Emergency Response Technical Team (CN-CERT) says in its first-half report for 2019 that apps request an average of 25 permissions when installed, which is concerning as data theft remains a widespread issue.
Thirty-two percent of healthcare organizations store a wide range of sensitive data in the cloud, including healthcare data and personally identifiable information (PII) of customers and employees.
What is an insider threat? Security professionals know that insider threats, by their nature, are a broad-based threat and, more than ever before, can be extremely difficult to defend against. In this article, we will briefly discuss the possible risks, as well as some options for building up your defenses.
In Australia, data loss/theft of confidential information incidents rose by 78.7 percent in 2018 compared to 2017 and data breaches experienced through third party providers and suppliers rose by 74.3 percent, according to the BDO and AusCERT 2018/19 Cyber Security Survey.
Verizon’s second Mobile Security Index finds that more organizations are compromising mobile security in order to “get the job done”, and in turn are facing a greater risk of data loss, downtime and damage to their reputation and customer relationships.
A team of cybersecurity researchers at Ben-Gurion University of the Negev (BGU) has demonstrated that valuable user information can be exfiltrated by tracking smartphone touch movements to impersonate a user on compromised, third party touchscreens while sending emails, conducting financial transactions or even playing games.
With one-third of working adults in the U.S. admitting to potentially risky behavior at work, employee negligence poses major security concerns for U.S. businesses.