New enterprise browser aimed at securing BYOD and third-party devices

Man working on computer laptop with triangle caution warning sig

Check Point is launching a new Enterprise Browser, extending zero trust security to unmanaged devices like BYOD, contractors, and third-party partners.

The new feature, available to Check Point Harmony SASE customers from today, delivers full visibility, granular policy enforcement, and compliance-ready data protection without persistent agents or endpoint ownership.

Continue reading

Insider breaches hit 61 percent of enterprises

Data-Breach-Hand

A new study sponsored by OPSWAT, a specialist in critical infrastructure protection, reveals that organizations face escalating risks from insider activity, legacy tools, and the growing complexity of artificial intelligence (AI).

Based on research carried out by the Ponemon Institute, the report finds that in the past two years, 61 percent of organizations have suffered file-related breaches caused by negligent or malicious insiders, at an average cost of $2.7 million per incident.

Continue reading

How AI agents are reshaping the threat landscape

Risk threat readiness

The agentic AI ecosystem, powered by large language models (LLMs), is creating a new class of cybersecurity risks according to a new report.

The study from Radware finds AI agents can act autonomously, access tools and private resources, and interoperate between one another. As enterprises turn to AI agents, there is a need to govern and secure this new emerging layer of digital infrastructure.

Continue reading

Enterprises left dangerously exposed by identity protection ‘maturity myth’

Glowing security padlock

New research from Osterman and Silverfort reveals that although nearly 70 percent of organizations believe their identity defenses are ‘mature’ there is a worrying gap between perception and reality.

This comes against a rising tide of identity threats, 72.1 percent of identity leaders report that the threat level of identity-related attacks has increased or remained unchanged in the past year. The most significant jumps include AI-powered attacks, ransomware-based attacks, and social engineering of desk staff to reset credentials or MFA factors (up 14.3 percent).

Continue reading

Tycoon phishing kit uses sneaky new techniques to hide malicious links

Woman touching a phishing concept

Phishing emails often feature malicious links (URLs) that lead victims to fake websites
where they are infected with harmful software or tricked into giving away personal
information.

There’s a constant battle between security tools getting better at identifying bad links and attackers trying to hide them more effectively. Barracuda has uncovered some of the latest approaches its researchers are seeing in attacks involving the advanced phishing-as-a-service (PhaaS) kit, Tycoon.

Continue reading

Securing Kubernetes in the enterprise [Q&A]

Secure by design

As more organizations scale up containerized workloads they’re also facing increasing security and compliance challenges.

Kim McMahon part of the leadership team at Sidero Labs to discuss the vulnerabilities enterprises are encountering when scaling up Kubernetes on traditional operating systems and what they can do to counter them.

Continue reading

Why one-time security assessments are no longer sufficient [Q&A]

Observability magnifier code

With cyber threats becoming more numerous and ever more sophisticated, it’s becoming more critical than ever for organizations to prioritize targeted threats, optimize their existing defensive capabilities and proactively reduce their exposure.

One-time security assessments are looking increasingly inadequate. We spoke to CyberProof CEO Tony Velleca to discuss how organizations can effectively implement a Continuous Threat Exposure Management (CTEM) strategy to improve their protection.

Continue reading

How much is your privacy at risk from wearable devices?

Wearable device

Wearable devices have brought us numerous benefits in recent years, allowing us to understand our health and fitness level better and encouraging a more active lifestyle. But are they also putting our privacy at risk?

A new report from vpnMentor takes a look into what information wearable devices are collecting. It also investigates how that data is being used, shared and, in some cases, monetized.

Continue reading

The passwords most likely to get you hacked

Weak password qwerty

Even as we shift to other forms of authentication, passwords aren't going away anytime soon. New research from Peec AI has analyzed over 100 million leaked passwords to uncover the most common words and phrases used, which also of course are the ones most likely to get your account compromised.

There are some interesting findings. Names are still a popular choice with ‘Michael’ one of the most commonly used as a password, included in 107,678 of those analyzed. ‘Daniel’ is the second most used name, with a count of 99,399 passwords. Other popular choices include ‘Ashley’, ‘Jessica’, ‘Charlie’, ‘Jordan’ and ‘Michelle’.

Continue reading

Why the traditional SOC model needs to evolve [Q&A]

Data Security

The security operations center (SOC) has long relied on traditional SOAR platforms to manage incidents, but today’s threat landscape is moving too fast for rigid, static approaches. As attackers use AI to evolve their tactics, security teams need smarter, more adaptive systems to keep up.

We spoke to Tom Findling, co-founder and CEO of Conifers.ai, about how AI-powered SOC platforms are helping organizations scale their defenses, improve threat detection, and move from reactive alert management to proactive risk reduction.

Continue reading

Concealing cyberattacks risks penalties and harms trust

Hidden secret computer use

Last month Bitdefender revealed that 70 percent of UK CISO have faced pressure to conceal security incidents, cyberattacks and breaches.

But compliance training specialist Skillcast is warning that this could risk regulatory penalties and erode trust. The concern is heightened by escalating threats, with 612,000 UK businesses and 61,000 UK charities reporting a cyber breach or attack in the past year, with the average cost of the most disruptive breach reaching £3,550 ($4,790) for businesses and £8,690 ($11,730) for charities.

Continue reading

Proton introduces emergency access to accounts

Emergency ambulance

Imagine the scenario, you’re suddenly hospitalized or incapacitated following an accident but access to important information like insurance details is locked up in your computer and online accounts which no one else can access.

For this and other emergency situations Proton is launching an Emergency Access feature so that passwords and logins, documents and files will be recoverable by trusted individuals in case of an emergency.

Continue reading

Less than a third of organizations are prepared for deepfake attacks

Deepfake plan

Nearly 40 percent of organizations admit they are underprepared for AI-driven threats such as automated attacks, deepfake-based videos, and voice scams, according to new research from LevelBlue.

The new findings show that while awareness of these dangers is growing, many companies remain vulnerable and lack confidence in their ability to defend against them.

Continue reading

CISOs under pressure to keep data secure during AI rollouts without harming growth

AI-security

IT leaders are optimistic about the value AI can deliver, but readiness is low. Many organizations still lack the security, governance and alignment needed to deploy AI responsibly.

A new study by the Ponemon Institute for OpenText finds 57 percent of CIOs, CISOs, and other IT leaders rate AI adoption as a top priority, and 54 percent are confident they can demonstrate ROI from AI initiatives. However, 53 percent say it is ‘very difficult’ or ‘extremely difficult’ to reduce AI security and legal risks.

Continue reading

Students expect tougher digital identity protection

computer vision eye

As students head back to university and college and engage with more digital platforms than ever, new research shows today’s tech-savvy demographic is sounding the alarm on digital identity protection as AI-generated scams surge.

The 2025 Online Identity Study from Jumio shows students globally are both early adopters of generative AI, with 70 percent using AI to create or modify images, but also the group most exposed to its risks.

Continue reading

Load More Articles