personality traits

Personality Traits: Key to More Effective Security Training?

Organizations that understand their employees’ personality types could better shape their security awareness training, research shows We know that employees are one of the biggest threats—whether accidentally or through malicious intent—to network ...
Security Boulevard
industries phishing

Walmart, Best Buy and Phishing Scams

Holidays are prime time for malicious activity with retailers, including phishing scams One thing we know about consumer-focused cybercriminals is they’re more likely to strike during busy shopping periods. Black Friday, the ...
Security Boulevard
network access

DevOps Chat: SOTI Report With Akamai’s Martin McKeay

Akamai recently released its latest State of the Internet (SOTI) report, focusing on the financial sector. This SOTI edition, titled “Financial Services Attack Economy,” highlights the vast array of cyberattacks targeted at ...
Security Boulevard
SMBs Vulnerable Imminent Cyberattacks

Nearly Half of SMBs Feel Vulnerable to Imminent Cyberattacks

A recent AppRiver survey shows growing concern among SMBs regarding cyberthreats How would you feel if you were told you would be vulnerable to an imminent car crash? Or imminent food poisoning? ...
Security Boulevard
How Robots Are Saving the Dairy Farm

Are Connected Cows a Hacker’s Dream?

Humans aren’t the only ones consumed with connected devices these days. Cows have joined our ranks. Believe it or not, farmers are increasingly relying on IoT devices to keep their cattle connected ...
™

SlashNext Introduces Industry’s First Real-Time Phishing Threat Intelligence Service

Today marks an important time for SlashNext, IT security teams, and the security industry. ... The post SlashNext Introduces Industry’s First Real-Time Phishing Threat Intelligence Service appeared first on SlashNext ...
Benefits of New Technologies Bring Hidden Security Risks

The Cyber-Risk Paradox: Benefits of New Technologies Bring Hidden Security Risks

When attending cybersecurity conferences, you expect to learn a lot of interesting things surrounding data security, but my experience is that there is always one tidbit, one piece of information, that jumps ...
Security Boulevard

9 Reasons Cyberattacks are So Successful

In a recent whitepaper, sponsored by SlashNext, Osterman Research conducted a survey of IT decision makers, ... The post 9 Reasons Cyberattacks are So Successful appeared first on SlashNext ...

How Cybercriminals Are Getting Initial Access into Your System

This article covers the main techniques cybercriminals use at the initial stage of attacks against enterprise networks. There are several dangerous phases of cyberattacks targeting the corporate segment. The first one encountered ...
Future-proofing-security-in-post-quantum-cryptography-world

Why We Should Focus on ‘How,’ not ‘Who,’ of Cyberattacks

Organizations often don’t understand what they need to be protecting themselves from when it comes to costly cyberattacks. The threat landscape is becoming ever more evolved and it’s now rare for a ...
Security Boulevard
Loading...