Wait, there's more! Check out the second half of our predictions for cyber security trends in 2016.
See what we expect will happen in healthcare, regulation, DDoS attacks, and more.Continue reading
2016 is here and we have a full year of cyber security news and trends ahead of us.
But what happened last year? And what does it mean for 2016? Read on to find out.Continue reading
Romance scams, business email fraud, and scams targeting the elderly, were all popular last year, according to the annual report of the FBI Internet Crime Compliant Center.
In this post, we highlight four trends shown in the FBI’s data. You’ll see that social media scams increased 400%, and who is most at risk for romance scams and business email compromises.Continue reading
Everything was great. You were in compliance with PCI DSS. You were the belle of the ball. Everyone was in awe of your team. Then it was midnight -- and your compliance vanished.
Or did it? When the clock strikes 12:00 on June 30, PCI will have five new rules as its ‘best practice guidelines’ become requirements. Will you still be in compliance?
In this post, you’ll see the five new rules so you can have them covered.Continue reading
Chances are you can name four or five types of network attacks – but which are the most common? And which are you most likely to see on one of your networks?
In this post, we show the top 7 types of network attacks worldwide during the first quarter of 2015. You’ll see the list and description for each type.Continue reading
You’ve heard about the massive data breaches at hospitals and health insurers – but what about their business associates? Are IT providers seeing similar attacks? And are the attacks successful?
In short: yes. Find out more about the growing number of attacks on healthcare business associates. See the top causes of data breaches and the most-targeted types of data.Continue reading
Denial-of-service attacks continue to grow in frequency and size. But are all DDoS attacks the same? And what motivates people to launch one of these attacks?
Find answers to these questions and more in this post. You’ll also see the most common types of tools and targets for application-layer attacks.Continue reading
See which threats are growing fastest, which industries are targeted the most, and how one in four data breaches last year hit a POS system.
You’ll get this and more in our summary of the Verizon 2015 Data Breach Investigations Report. The report is a whopper at 60+ pages. We highlight our 10 favorite charts to get you up to date and save you time.Continue reading
Did you know more than 75% of phishing emails seen by Mandiant last year impersonated the IT staff or an antivirus solution? Scarey, right?
Learn more about this threat and others highlighted in Mandiant's latest report. You'll also see which industries are attacked most (not the ones you think) and why VPN is a growing target for attackers.Continue reading
PCI compliance is rising across the industry, but did you know that four out of five organizations that achieve compliance fail an assessment less than a year later? That finding and more comes from Verizon’s 2015 PCI Compliance Report.
In this post, see which PCI requirements are most correlated with having a data breach. You’ll also see why we expect a rise in card-not-present fraud and why maintaining compliance is so difficult.Continue reading