Preview Mode
Documentation

Leadership Perspectives: Simplifying security in the age of complexity

Hear from tech leaders on the future of AI, advocating for security investments, and battling human error.

theNET | Threat Landscape | Insights for the digital enterprise

Multi-cloud compliance in a multi-jurisdictional world

Gartner reports that 99% of compromised data will result from cloud misconfigurations and account breaches. Here's how leaders can ensure data compliance across multiple clouds and jurisdictions.

Read (5 min)
Featured Content

A new threat has come to town

With the holidays and a new year, organizations will face new threats that will extend seasonal patterns

Read (6 min)

Ecommerce security for the holidays

Business, web traffic, and cyber attacks all ramp up during the holiday season — these four preparations can help you be better positioned to succeed

Read (4 min)

Your first line of defense in cyber security

Cyber attacks due to human error are on the rise — making a security-first culture more critical than ever

Read (4 min)

Financial services organizations are more targeted than ever

The financial services industry experienced the most data breaches of any industry in 2023 — and there have been several notable bank breaches in 2024

Read (4 min)

Receive a monthly recap of the most popular Internet insights!

Evaluating readiness for a new cyber security landscape

Three key trends from the 2024 Asia Pacific cyber readiness survey — Organizations will need to act quickly to prepare for these latest threats

Read (3 min)

The API imperative: Safeguarding digital lifelines

APIs are central for how apps and websites work today — and as a result, they have become prime targets for attackers

Read (6 min)

Cloud implications on business security

An upsurge in DDoS attacks, the expansion of hybrid work, and a rise in hacktivism related to geopolitical conflicts are forcing organizations to strengthen cloud security. Organizations should recalibrate strategies now to stay ahead

Read (5 min)

State of application security

Web applications are rarely built with security in mind. Yet, we use them daily for all sorts of critical functions, making them a rich target for hackers — here are 3 emerging trends requiring urgent attention from CISOs

Read (4 min)

Securing the future: Cyber security readiness report

This 10-part series for CISOs looking to secure the future and achieve better outcomes for their organization breaks down survey results from over 4,000 cyber security professionals and uncovers new findings on security incidents and preparedness

Chapters (10)

Three emerging security trends

Security programs face constant expansion while tasked with protecting an evolving attack surface, especially as organizations rush to build and deploy internal AI models — Here are 3 emerging trends requiring immediate attention from CISOs

Read (5 min)

Client-side attacks are mounting

Two new PCI compliance requirements aim to secure client-side environments and protect customers who are being exploited by supply chain attacks

Read (4 min)

Malware disguised as developer tools

Attackers are finding more effective ways to infiltrate organizations, developer systems being the latest target — three signs of common scams and the strategies to spot and stop them

Read (4 min)

Impersonation is fooling the enterprise

Name impersonation attacks are evolving — 3 real-life examples of this threat that organizations are struggling to mitigate

Read (7min)

Three ways to stay ahead of new API threats

There are 200 million public and private APIs in use, and growing — to securely leverage their power, organizations need purpose-built API management

Read (7 min)

Are OSS attacks avoidable?

Open source software attacks are preventable, but not prevented — 4 tips to minimize OSS risk and reduce the likelihood of attack

Read (6 min)

Catching the phish

Phishing is still the initial vector for 9 out of every 10 cyber attacks. Here are 3 key actions to strengthen any organization’s security posture

Read (6 min)

The state of API security

The surge in API attacks underscores the need for a deeper understanding and a more sophisticated defense posture

Read (7 min)

The next era of DDoS attacks

The HTTP/2 ‘Rapid Reset’ attack leaves the majority of web applications and servers vulnerable with over 62% of all Internet traffic using the HTTP/2 protocol

Read (6 min)

Phishing attacks leveraging legitimate services

Cybercriminals are stepping-up their game — no longer just impersonating brands but leveraging legitimate services from those brands to deliver their payload

Read (3 min)

Phishing keeps evolving

Latest trends show new ways of exploiting human behavior with an emphasis on multichannel attacks

Read (7 min)
Secure login screen

The ripple effect of compromised credentials

44% of employees use the same credentials for personal and work accounts — once exposed, the vulnerability is shared with their organization

Read (5 min)
Illustration of shield with data

Deep dive into the latest cyber threats

The latest refinements to cyber attacks has threat actors focusing on high-value targets, evading common DDoS defenses, and upgrading botnet infrastructure to enable larger attacks

Read (3 min)
Person on laptop with security icons

Risk grows as multi-vector becomes norm

Attackers targeting two (or more) vectors at a time - have dramatically improved their chances of successful entry

Read (5 min)

DDoS is on the rise

With cyber attacks becoming easier and cheaper to execute, DDoS attacks have become more prevalent. We've already seen attacks peaking above 71 million requests per second, the largest recorded this year

Read (3 min)
Image of an attack surface

Attack surface grows with API proliferation

The rapid growth of APIs has led to significant security risks for the enterprise

Read (6 min)
Image of a world map with icons

API growth parallels attacks

API attacks have reached an all-time high with 53% of data breaches attributed to compromised API tokens

Read (5 min)

Cyber attacks breach MFA

Attackers uncovering new ways to exploit even the most advanced security measures like MFA

Watch (15 min)
Image of an email alert with a padlock

Securing Microsoft 365

70% of the enterprise uses M365 making it one of the largest attack surfaces

Read (8 min)
Image of four blue locked padlocks and one unlocked orange padlock

The anatomy of Vendor Email Compromise

Slow play attacks with bigger payouts are emerging as adversaries get more sophisticated

Read (6 min)
Image of an alert with binary code

The risks of security monitoring fatigue

4 recommendations to reduce data overload and burnout

Read (6 min)
Image of a digital shield

Ransomware attackers escalating extortion

7 trends raising the stakes and intensifying negotiations

Read (6 min)
Illustration of business email compromise

BEC loss is rising

Highly targeted, difficult-to-detect phishing attacks are behind recent headlines

Read (6 min)
Image of a person working on a laptop with a fingerprint and icon overlay

Bypassing MFA: The latest exploit

5 ways a Zero Trust strategy can help prevent MFA exploitation and protect user data

Read (5 min)
Image of a hand typing on a keyboard

Using DDoS threats to extort organizations

Attackers proving willing to carry out ransom threats using network DDoS

Read (5 min)
Image of a person typing on a keyboard

Internal threats reach annual $600K cost

Remote work makes malicious insider attacks difficult to detect

Read (6 min)
Two people inspecting code on a monitor

The growing cost of shadow IT

80% of employees adopt unsanctioned SaaS applications — exposing the corporate network

Read (6 min)
Close up image of a computer keyboard

The risks smaller DDoS attacks pose

Attack techniques are evolving away from large-scale attacks to focus on smaller, shorter DDoS campaigns

Read (9 min)