Cyberwarfare is a threat to their organization according to 71 percent of CISO, yet just over a fifth (22 percent) admit to not having a strategy in place to deal with this risk.
However, Bitdefender's latest global study shows that the threat is being taken seriously, with 51 percent and 48 percent respectively stating that they believe they will need a strategy against cyberwarfare in the next 12-18 months.
By 2021, it's estimated that more than four million job openings in cybersecurity will be unfilled. Cybersecurity career development platform Cybrary has conducted a skills gap survey of more than 800 security and IT professionals in order to understand growing skills gap.
Among key findings are that 68 percent of respondents say they have to invest their own free time -- either before and after work (48 percent) or at weekends (20 percent) -- to improve their cyber skills.
While the pandemic has driven a shift to remote working, a new report from cyber security vendor Netwrix shows that that 85 percent of CISOs admit they've sacrificed cybersecurity to enable it to happen.
One in four organizations feels that they are exposed to more risks than before the pandemic. Of these, 63 percent report an increase in the frequency of cyberattacks and 60 percent have found new security gaps as a result of the transition to remote work.
A new report shows that India is increasing its cyber capabilities and becoming a growing cyber powerhouse with its cybersecurity market expected to rise from $1.97 billion in 2019 to over $3 billion by 2022.
But the study from threat intelligence platform IntSights also shows that the country has a growing cybercriminal underground. A young, tech-savvy population with limited access to careers in the domestic tech sector is at risk of being lured into cybercriminal activities to provide for their families.
Accounts that have privileged access are a problem when it comes to data breaches, so securing them effectively is essential.
But things are complicated by the fact that where privileged access was once designated only for system administrators it has now been expanded to HR, finance, legal and many more parts of the organization, as well as to non-human users like machines and applications.
The second quarter of 2020 has seen a massive 570 percent increase in 'bit-and-piece' DDoS attacks compared to the same period last year, according to the latest threat report from Nexusguard.
Bit-and-piece attacks target ASN-level communication service provider (CSP) networks by dispersing small pieces of junk traffic across a diverse pool of IP addresses across hundreds of IP prefixes.
Ransomware is a persistent problem, with cybercriminals always looking for new ways to evade detection and infect systems. Attacks have increased 20 percent in the first half of this year.
Endpoint detection and response company Nyotron is launching a new, free online tool called Ransomwiz that allows allows security professionals to check their defenses by generating actual ransomware samples using a variety of real-world attack techniques.
One of the side effects of the COVID-19 pandemic has been a marked reduction in the use of cash as people have shifted to using cashless and contactless payment methods.
This has put increased pressure on financial institutions to offer digital services, but it’s also shone a spotlight on the measures needed to prevent fraud and on initiatives to integrate cryptocurrency into everyday transactions.
More than 80 percent of government cyber security leaders think public-private collaboration would help them keep pace with cyber threats, according to a new report.
The study from Nominet of government agencies in the UK, US and the Middle East, also shows that 65 percent of respondents think their pace of change is too slow in comparison to enterprises and 81 percent believe that a slow pace of change can negatively impact national cyber defense.
Although you may be old enough to have ceased believing in Santa Claus and the Easter Bunny (if you're not we advise you to stop reading now), there are likely to be some things you think you know about about technology that are equally mythical.
According to a survey of 1,000 Americans from HighSpeedInternet.com 86 percent believe that 5G is going to completely replace 4G. In fact it's not, just as 4G hasn't replaced 3G, so you won't have to rush out to get a new phone as 5G comes in.
Starting in March and continuing through most of the spring, there has been a significant increase in malicious emails utilizing various COVID-19 issues as a lure to manipulate users into exposing themselves to various email attacks and scams.
The latest Attack Landscape report from F-Secure shows COVID-related emails range from attempting to trick users into ordering face masks from phony websites to infecting themselves with malware by opening malicious attachments.
With workforces more dispersed and reliant on collaboration technologies, the risk of sensitive business information falling into the wrong hands is increased.
Code42 is launching a new SaaS tool called Incydr, aimed at guarding intellectual property, source code and trade secrets, built to mitigate exposure from data exfiltration and to directly address the gaps in traditional security solutions for insider threats.
The numerous challenges of 2020 have proved to be fertile ground for ransomware attacks, with the number up by nine percent compared to the first quarter and by 59 percent compared to the second quarter of 2019.
The latest Threatscape report from Positive Technologies shows that 16 percent of phishing attacks took advantage of COVID-19 concerns, and there is also evidence that ransomware operators have started cooperating with each other.
A new study reveals that calendars for security and compliance audits are largely unchanged despite COVID-19, yet the pandemic is straining teams as they work remotely.
The survey from automated audit preparation company Shujinko shows that CISOs are tasked with preparing for more than three audits on average in the next 6-12 months, but are struggling with inadequate tools, limited budgets and personnel, and inefficient manual processes.