Generative Data Intelligence

Tag: Ponemon Institute

LightEdge Releases Next-Gen Suite of Cloud Security & Managed Services

PRESS RELEASEDES MOINES, Iowa, Feb. 15, 2024 /PRNewswire/ -- LightEdge, a leading provider of secure cloud and colocation, has unveiled the next generation of its cloud security...

Top News

Cerby Announces $17M in Series A Funding to Secure Nonstandard Applications

ALAMEDA, Calif., Aug. 22, 2023 /PRNewswire/ -- Cerby, the comprehensive access management platform for nonstandard applications, today announced that the company has raised $17 million in Series A funding....

The danger within: 5 steps you can take to combat insider threats | WeLiveSecurity

Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar? It...

The danger within: 5 steps you can take to combat insider threats

Business Security Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar?...

Breakthrough Study Reveals Executives Are Not Adequately Protected From Personal Cyber-Attacks

Only 16% of respondents say their organizations are highly confident that CEO or executives’ personal email or social media accounts are protected...

Enterprises Must Prepare Now for Shorter TLS Certificate Lifespans

On March 3, Google (via The Chromium Projects, which it controls) proposed a plan to drastically shorten the lifespan of Transport Layer Security (TLS)...

Creating strong, yet user-friendly passwords: Tips for your business password policy

When engineer Bill Burr from the U.S. National Institute of Standards and Technology (NIST) wrote in 2003 what would soon become the world’s gold...

Creating strong, yet user‑friendly passwords: Tips for your business password policy

Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves...

The Third-Party Cybersecurity Problem for Financial Organizations (Terry Olaes)

Today’s financial institutions are undergoing a transformation to modernize their organizations, increasingly relying on outsourcing operational tasks to third parties to increase efficiency. Many...

The FDA’s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say

The Food and Drug Administration (FDA) this week put into effect fresh guidance concerning the cybersecurity of medical devices — long a concerning area...

Leveraging Behavioral Analysis to Catch Living-Off-the-Land Attacks

The most advanced cyberattackers try to look like your administrators, abusing legitimate credentials, using legitimate system binaries or tools that are natively utilized in...

Attackers Were on Network for 2 Years, News Corp Says

The state-sponsored attackers behind a breach that News Corp disclosed last year had actually been on its network for nearly two years already by...

87% of Container Images in Production Have Critical or High-Severity Vulnerabilities

At the recent CloudNativeSecurityCon in Seattle, 800 DevSecOps practitioners gathered to address a myriad of software supply chain security issues, including the security of...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?