Blog

  • 60 percent of users employ one or more passwords across multiple accounts
  • Cyber criminals exploit user negligence to steal credentials and attempt logins across various sites
  • The increasing prevalence of credential stuffing attacks correlates with an increase in leaked credentials available on the dark web
  • Many reports received by the FBI indicate the use of botnet credential stuffing

Continue reading “FBI: 41% of Financial Sector Cyber Attacks Come from Credential Stuffing”

  • 36% of respondents say they don’t need privileged access to do their jobs but have it anyway
  • 85% of IT pros say the risk is either unchanged or increasing in the next 12 to 24 months
  • 60% of respondents working in government find it difficult to detect insider threats because behavior is consistent with the individuals’ role and responsibility
  • Respondents in the commercial sector say their current cybersecurity tool stack yields too many false positives and more data than can be reviewed in a timely fashion

Continue reading “Current Security Tools Hamper Detection of Insider Threats, Survey Shows”

Adoption of cloud services has been the main transformative force in IT, with Cloud Service Providers and Managed Service Providers helping companies reap the benefits of lower cost, greater agility and improved flexibility. The rapid change has left many still using security controls designed for physical systems and unsure how to protect today’s hybrid and multi-cloud environments. Given the situation, it’s no surprise that:

Continue reading “Seizing the Cloud Security Opportunity”

  • Data privacy, particularly for personally identifiable information, has become more important for consumers.
  • Many consumers do not trust how companies are using their data.
  • Businesses need to take steps to ensure optimum data security and privacy.

Continue reading “Many Consumers Don’t Trust the Way Companies are Using Their Data—and Businesses Need to Change that Perception”