Zephyrnet Logo

Tag: Ponemon Institute

Top News

The danger within: 5 steps you can take to combat insider threats | WeLiveSecurity

Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar? It...

Top 12 IoT security threats and risks to prioritize | TechTarget

IoT endpoints have become prime targets for hackers.In fact, Forrester Research concluded in its "The State of IoT Security, 2023" report that IoT devices...

MedCrypt partnership helps reduce cybersecurity risk for medical devices

<!----> US-based medical device cybersecurity company MedCrypt has partnered with Stratigos Security to provide security assessments and penetration...

Breakthrough Study Reveals Executives Are Not Adequately Protected From Personal Cyber-Attacks

Only 16% of respondents say their organizations are highly confident that CEO or executives’ personal email or social media accounts are protected...

Creating strong, yet user‑friendly passwords: Tips for your business password policy

Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves...

The Third-Party Cybersecurity Problem for Financial Organizations (Terry Olaes)

Today’s financial institutions are undergoing a transformation to modernize their organizations, increasingly relying on outsourcing operational tasks to third parties to increase efficiency. Many...

Cynerio, Sodexo partner to get ahead of risks, attacks on network-connected medical devices

New York, United States – Cynerio, a provider of healthcare IoT cybersecurity, has announced a new partnership with Sodexo, a global provider in healthcare technology management,...

The FDA’s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say

The Food and Drug Administration (FDA) this week put into effect fresh guidance concerning the cybersecurity of medical devices — long a concerning area...

Leveraging Behavioral Analysis to Catch Living-Off-the-Land Attacks

The most advanced cyberattackers try to look like your administrators, abusing legitimate credentials, using legitimate system binaries or tools that are natively utilized in...

Attackers Were on Network for 2 Years, News Corp Says

The state-sponsored attackers behind a breach that News Corp disclosed last year had actually been on its network for nearly two years already by...

A Manufacturer’s Guide to Business Application Security

Today’s supply chains have become highly volatile and unpredictable. Yet, while issues caused by severe weather and port closures might not be preventable, there...

87% of Container Images in Production Have Critical or High-Severity Vulnerabilities

At the recent CloudNativeSecurityCon in Seattle, 800 DevSecOps practitioners gathered to address a myriad of software supply chain security issues, including the security of...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?