Hear from tech leaders on the future of AI, advocating for security investments, and battling human error.
Gartner reports that 99% of compromised data will result from cloud misconfigurations and account breaches. Here's how leaders can ensure data compliance across multiple clouds and jurisdictions.
With the holidays and a new year, organizations will face new threats that will extend seasonal patterns
Business, web traffic, and cyber attacks all ramp up during the holiday season — these four preparations can help you be better positioned to succeed
Cyber attacks due to human error are on the rise — making a security-first culture more critical than ever
The financial services industry experienced the most data breaches of any industry in 2023 — and there have been several notable bank breaches in 2024
Three key trends from the 2024 Asia Pacific cyber readiness survey — Organizations will need to act quickly to prepare for these latest threats
APIs are central for how apps and websites work today — and as a result, they have become prime targets for attackers
An upsurge in DDoS attacks, the expansion of hybrid work, and a rise in hacktivism related to geopolitical conflicts are forcing organizations to strengthen cloud security. Organizations should recalibrate strategies now to stay ahead
Web applications are rarely built with security in mind. Yet, we use them daily for all sorts of critical functions, making them a rich target for hackers — here are 3 emerging trends requiring urgent attention from CISOs
This 10-part series for CISOs looking to secure the future and achieve better outcomes for their organization breaks down survey results from over 4,000 cyber security professionals and uncovers new findings on security incidents and preparedness
Security programs face constant expansion while tasked with protecting an evolving attack surface, especially as organizations rush to build and deploy internal AI models — Here are 3 emerging trends requiring immediate attention from CISOs
Two new PCI compliance requirements aim to secure client-side environments and protect customers who are being exploited by supply chain attacks
Attackers are finding more effective ways to infiltrate organizations, developer systems being the latest target — three signs of common scams and the strategies to spot and stop them
Name impersonation attacks are evolving — 3 real-life examples of this threat that organizations are struggling to mitigate
There are 200 million public and private APIs in use, and growing — to securely leverage their power, organizations need purpose-built API management
Open source software attacks are preventable, but not prevented — 4 tips to minimize OSS risk and reduce the likelihood of attack
Phishing is still the initial vector for 9 out of every 10 cyber attacks. Here are 3 key actions to strengthen any organization’s security posture
The surge in API attacks underscores the need for a deeper understanding and a more sophisticated defense posture
The HTTP/2 ‘Rapid Reset’ attack leaves the majority of web applications and servers vulnerable with over 62% of all Internet traffic using the HTTP/2 protocol
Cybercriminals are stepping-up their game — no longer just impersonating brands but leveraging legitimate services from those brands to deliver their payload
Latest trends show new ways of exploiting human behavior with an emphasis on multichannel attacks
44% of employees use the same credentials for personal and work accounts — once exposed, the vulnerability is shared with their organization
The latest refinements to cyber attacks has threat actors focusing on high-value targets, evading common DDoS defenses, and upgrading botnet infrastructure to enable larger attacks
Attackers targeting two (or more) vectors at a time - have dramatically improved their chances of successful entry
With cyber attacks becoming easier and cheaper to execute, DDoS attacks have become more prevalent. We've already seen attacks peaking above 71 million requests per second, the largest recorded this year
The rapid growth of APIs has led to significant security risks for the enterprise
API attacks have reached an all-time high with 53% of data breaches attributed to compromised API tokens
Attackers uncovering new ways to exploit even the most advanced security measures like MFA
70% of the enterprise uses M365 making it one of the largest attack surfaces
Slow play attacks with bigger payouts are emerging as adversaries get more sophisticated
4 recommendations to reduce data overload and burnout
7 trends raising the stakes and intensifying negotiations
Highly targeted, difficult-to-detect phishing attacks are behind recent headlines
5 ways a Zero Trust strategy can help prevent MFA exploitation and protect user data
Attackers proving willing to carry out ransom threats using network DDoS
Remote work makes malicious insider attacks difficult to detect
80% of employees adopt unsanctioned SaaS applications — exposing the corporate network
Attack techniques are evolving away from large-scale attacks to focus on smaller, shorter DDoS campaigns