Insights

How GDPR Is Failing
The world-leading data law changed how companies work. But four years on, there’s a lag on cleaning up Big Tech. One thousand four hundred and … See all articles in Insights

Scientists create new method to kill cyberattacks in less than a second
A new method that could automatically detect and kill cyberattacks on our laptops, computers and smart devices in under a second has been created by … See all articles in Insights

Why a cloud-native approach is critical to digital transformation
The cloud-native approach is about more than taking your application as it exists today and making it work in the cloud. Cloud computing has proven itself a viable technology model in this first phase of its life cycle. The pandemic accelerated cloud adoption by three to five years and helped … See all articles in Insights

America’s small businesses aren’t ready for a cyberattack
Some of the highest profile cyberattacks on the U.S. in recent years are alleged to have originated in Russia, including the 2021 attack on the … See all articles in Insights

Report: 80% of cyberattack techniques evade detection by SIEMs
According to a new report by CardinalOps, on average, enterprise SIEMs are missing detections for 80% of all MITRE ATT&CK techniques and only address five of the top 14 ATT&CK techniques employed by adversaries in the wild. CardinalOps’ second annual report on the state of SIEM detection risk … See all articles in Insights

MI5 and FBI sound the alarm on online espionage with LinkedIn a prime target
Foreign spies are using professional social network LinkedIn to gather information on users. By Afiq Fitri Foreign spies are using fake LinkedIn … See all articles in Insights

46% of organizations still store passwords in shared documents – Help Net Security
46% of IT, security, and cybersecurity leaders say they still store passwords in shared office documents. That’s despite an overwhelming 93% of … See all articles in Insights

This simple cyberattack is still among the most effective
Cybercriminals may be getting more sophisticated by the day, but simple HTML file distribution still remains one of the most popular tactics, new … See all articles in Insights

50% of Orgs Rely on Email to Manage Security
Even with dedicated identity management tools at their disposal, many companies — smaller ones especially — are sticking with email and spreadsheets … See all articles in Insights