Awareness experts weigh in about the essential elements for an awareness program that keeps users engaged — and helps them identify major threats to an organization's security posture.
The education industry faces a security crisis, one that goes beyond protecting the classrooms and hallways. IT professionals in the education sector see cybersecurity as their top priority, consistently ranking it as their No. 1 concern. However,...
The key to creating a culture of cyber awareness is to start small, set achievable goals and help employees understand how enterprise security affects their own privacy.
At RSAC 2018, many speakers urged organizations to take the human element out of the security equation as much as possible by investing in automated tools and focusing on professional development.
According to a new report, cybercriminals now prefer to leverage human-centered vulnerabilities rather than launching automated attacks.
As long as C-suite executives believe that cybersecurity is an IT issue, they will remain disengaged from the solutions and their role in supporting a robust cyber risk management strategy.
100 Percent of Web Applications Vulnerable to Attack Despite Big Spending on Global Security Services
One-hundred percent of web applications are vulnerable to attack, despite analyst predictions that global security services spending will reach $96 billion in 2018.
Twenty-Seven Percent of Employees Fail Social Engineering Test, Suggesting Need for Better Cybersecurity Training
According to a recent study, 27 percent of employees failed to respond appropriately to a simulated phishing exercise, underscoring the need for better cybersecurity training.
Social engineering dates back to ancient times. Today, the most common forms of social trickery include baiting, vishing, phishing and other schemes designed to exploit human nature.
Employees represent the first line of defense against cyberthreats, and effective security awareness training is more crucial than ever given the volatility and sophistication of the threat landscape.