Security leaders discuss LLMs that may present security concerns Jordyn Alger May 29, 2024 A recent study suggests that leading LLMs may come with security concerns, and security leaders are sharing their insights. Read More
3% of public sector applications are flaw free Security Staff May 29, 2024 Public sector security debt and application risk management was analyzed in a recent report by Veracode, finding 3% of applications are flaw free.Read More
Healthcare and finance were prominent cyberattack targets in 2023 Security Staff May 29, 2024 A new report discusses cyberattack trends in the United States, with healthcare and finance industries being hit the hardest. Read More
90% of organizations experienced an identity incident this past year Security Staff May 29, 2024 90% of organizations reported an identity-related event in the last year.Read More
WD Associates announces data breach Security Staff May 28, 2024 WD Associates announced a recent data security incident involving personal information including Social Security numbers and insurance information.Read More
70% of CISOs feel vulnerable to a material cyberattack in 2024 Security Staff May 28, 2024 A report surveyed 1,600 CISOs worldwide in order to shed light on their experiences, insights and predictions. Read More
Security leaders respond to ransomware attack on the city of Wichita Jordyn Alger May 28, 2024 Security leaders respond to the announcement that the city of Wichita, Kansas, was targeted by a ransomware attack. Read More
Security leaders are facing a new wave of identity risks Security Staff May 24, 2024 A study has found that increased technological and organizational complexity is contributing to new identity risks that security leaders must manage. Read More
Alphv and LockBit lose top spot to a smaller ransomware group Security Staff May 24, 2024 As of April 2024, the ransomware groups Alphv and LockBit have ceded the top spot to a smaller ransomware group. Read More
Malicious actors are cat-phishing targets in order to spread malware Security Staff May 24, 2024 Malicious actors are utilizing overdue invoice lures, open redirects and LotL tactics in order to bypass cybersecurity defenses. Read More