Research

This is a archive for Research.

Email Impersonation Attacks Skyrocket

There is a huge volume of email threats that go undetected by the incumbent technologies, a new report found. In
Read More.

Email Impersonation Attacks on Rise

Securing email continues to get more difficult as companies believe data breaches occurred because of attackers impersonating email. While companies
Read More.

Compliance Violation Witnesses Looking to Leave

A majority of workers that witnessed a compliance violation are actively looking for new positions, a new survey found. Twenty-nine
Read More.

IT Infrastructure Struggle for SMBs: Report

IT infrastructures continue to present a problem for small to medium-sized businesses, a new report found. Two-thirds (66 percent) of
Read More.

Industrial Firms Hit by Spear Phishing

A wave of financial spear-phishing emails disguised as legitimate procurement and accounting letters hit over 400 industrial organizations located mostly
Read More.

Phishing Works, Attackers Abuse Security Initiatives

It has been said quite a few times and it will be said for years to come, and that is
Read More.

Attack Target: Software Supply Chain

It is one thing to deal with attacks on a specific organization, but having to focus on assaults targeting the
Read More.

Little Improvement in Password Guidance

Internet giants like Amazon and Wikipedia are failing to support users with advice on how to securely protect their data,
Read More.

Ransomware Continues to Surge: Report

There are record numbers for malware volume, ransomware attacks, encrypted threats and chip-based attacks for the first six months of
Read More.

Collecting Data One Thing, Analyzing it Another

Businesses collect a boatload of data, however, 65 percent are unable to analyze all the data they collect and only
Read More.

 
 
Archived Entries