Netskope phishing Qakbot DarkGate ransomware

Netskope Report Surfaces Raft of Cybersecurity Challenges

A Netskope report revealed that, on average, 29 out of every 10,000 enterprise users clicked on a phishing link each month in 2023 ...
Security Boulevard
bypass Multi-Factor Authentication

3 ways attackers bypass Multi-Factor Authentication

And 3 ways to stop them. Multi-Factor Authentication (MFA) is much more popular than it used to be. It’s easy to use and the enhanced security that it provides is supported by ...
cloud security, cloud, cloud environment, data privacy, data protection, cloud security teams, security, cloud-native, Palo Alto Dell zero trust Network Security multi-cloud zero-trustQualys multi-cloud Wi-Fi 6 access point zero-trust cloud security remote data protection

Qualys Unveils Risk Management Platform

Qualys' Enterprise TruRisk platform aggregates signals from a wide range of disparate sources to measure and score risks ...
Security Boulevard
hybrid goals

Cybersecurity Goals Conflict With Business Aims

A study from Forrester Consulting found most organizations face challenges aligning cybersecurity priorities with business outcomes ...
Security Boulevard
organization, zero-trust, trust supply chain third-party

Zero-Trust: 5 Steps to Transition From Hype to Reality

The paradigm shift toward zero-trust has been years in the making for some organizations, while others still regard it as an aspiration. Although many organizations have touted their success in implementing the ...
Security Boulevard
Endpoint Detection Compared

Endpoint Detection Compared

We compare endpoint security products directly using real, major threats How can you test and judge endpoint protection products? SE Labs tested a variety of Endpoint Detection and Response products against a ...
Does it matter if your company is hacked?

Does it matter if your company is hacked?

And why are some businesses overconfident that they are secure? A true story: There was a team manager, a head of IT and a chief financial officer. I asked each if they ...
How to make your phishing campaign a success

How to make your phishing campaign a success

Phishing is the most frequently deployed method used by criminals to initiate a cyber attack, according to research from IBM. Phishing is designed to trick users into clicking on links or downloading ...
zero-trust encrypted AI Trend Micro cybersecurity poverty line, data-centric, SUSE cloud Wiz Torq AirTag Skyhawk SASE security cloud security visibility PwC Survey Finds C-Level Execs Now View Cybersecurity as Biggest Risk

SUSE Survey Surfaces Multiple Cloud Security Challenges

A survey of 501 IT professionals based in the U.S., United Kingdom and Germany published today found that, on average, organizations were impacted by four cloud-related security incidents in the past year ...
Security Boulevard
DIY email security

DIY email security

Can you defend against email threats better than the security companies? How well do the main email platforms handle threats? Is it worth paying for additional email security from a third-party specialist? ...