Trends

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

Cybercrime is a growth industry like no other. According to statistics from the FBI’s 2021 Internet Crime Report, complaints to the Internet Crime Complaint Center (IC3) have been rising since 2017. I...

Healthcare Cyberattacks Lead to Increased Mortality, Lower Patient Care: Ponemon Study

Nearly a quarter of healthcare organizations hit by ransomware attacks experienced an increase in patient mortality, according to a study from Ponemon Institute and Proofpoint released today. The ...

Top Cybersecurity Startups to Watch in 2022

Information security products, services, and professionals have never been in higher demand, making for a world of opportunities for cybersecurity startups. Investors recognize the potential too,...

Security Training: Moving on from Nick Burns Through Better Communication

Twenty years ago, Saturday Night Live nailed a tendency in IT to be overly absorbed in tech-speak and to do a poor job of educating users. The Nick Burns: Your Company Computer Guy skits showed rude ...

Cybersecurity Training and Tech Aren’t Enough; ‘Culture Change’ Needed

Companies spend a staggering amount of money on cybersecurity products to defend their networks and data from hackers, but a couple of industry pros say that money is wasted if companies don't change...

Exfiltration Can Be Stopped With Data-in-Use Encryption, Company Says

Even the most advanced and sophisticated security tools are failing to protect against ransomware and data exfiltration, according to a new report from data encryption vendor Titaniam. The St...

How One Company Survived a Ransomware Attack Without Paying the Ransom

The first signs of the ransomware attack at data storage vendor Spectra Logic were reports from a number of IT staffers about little things going wrong at the beginning of the day. Matters steadily w...

New Quantum-safe Cryptography Standards Arrive None Too Soon

A six-year quantum cryptography competition just ended, producing four new security standards selected by the U.S. Department of Commerce’s National Institute of Standards and Technology. The anno...

Linux Hacking is Easy with PwnKit

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added PwnKit as a high-severity Linux vulnerability to its list of actively exploited bugs. Recorded as CVE-2021-4034, with a C...

Hyperautomation and the Future of Cybersecurity

Next-gen AI systems are now baked into just about every category of software—but Gartner believes we can automate even further. For the last few years, Gartner has predicted that hyperautomation woul...

Latest articles