Companies are vulnerable to domain spoofing and phishing attacks that impersonate their corporate email domains—often because they don’t have…
Web Apps Are the Most Vulnerable to Breaches Web Apps Are the Most Vulnerable to Breaches On-premises data centers…
Information Governance Is Poor at Many Companies Information Governance Is Poor at Many Companies Many companies report inadequate information…
Technologies and Sectors Most Vulnerable to Hacks Technologies and Sectors Most Vulnerable to Hacks Web developers reported that the…
Domain Name System Is a Target for Hackers Domain Name System Is a Target for Hackers Today’s security solutions…
Most Databases in the Cloud Are Not Encrypted Most Databases in the Cloud Are Not Encrypted In violation of…
Ex-Employees Still Cause Data Breaches Ex-Employees Still Cause Data Breaches Ex-employees pose security threats to enterprises that fail to…
Intelligent automation—or intelligent process automation—is a trend that combines artificial intelligence (AI) with robotic process automation (RPA). The majority…
Why Employees Hide Cyber-Security Incidents Why Employees Hide Cyber-Security Incidents Uninformed and careless employees are hiding security incidents from…
Security or Agility? An Unnecessary Choice Security or Agility? An Unnecessary Choice As they digitally transform, enterprises can become…