With the year not yet over, the 2021 numbers are already 17% higher than those in 2020, with 1,291 breaches publicly reported during this year compared with the 1,108 data breaches reported in 2020.
The United Nations is still reeling from a data breach carried out at the beginning of the year using compromised employee login credentials, potentially purchased from the dark web for as little as $1,000.
When large, consumer facing companies are hacked, the impact can be enormous. Just ask T-Mobile, who are now on their fifth data breach in four years.
Evidence of Java’s inherent detriment to the security posture of organizations that rely on tools made with the language continued to surface during the first six months of 2021.
The ramifications of the devastating Equifax security breach are still being felt by both the company and the public.
In May 2020, C surged to the No. 1 spot on the prominent TIOBE index – notably, ahead of Java – for the first time since 2015.
Efforts to bring your IT infrastructure fully into the present are valuable, but it’s important that you don’t ever sacrifice security for modernization.
A new type of cyberattack capable of exploiting vulnerabilities in Java applications run through SIM cards installed on smartphones has been identified by a mobile security company, according to ZDNet.
Making the right decision on the cloud means you’ll need information.
The decentralized and digital-reliant framework many organizations have shifted to as a result of the pandemic may actually be an ideal environment for digital transformation.
The sheer financial ramifications of data breaches have become far too extensive to ignore, though other notable cybersecurity trends must also be examined as well.
The Department of Labor has plans for a modernization project that might not take off.
You already knew that data breaches can be costly. A new report from IBM and the Ponemon Institute suggests that’s truer now than ever before.
IT administrators must always be vigilant in the face of new cyberthreats — especially if they rely on legacy applications or hardware.