10 best practices to reduce the probability of a material breach

ThoughtLab announced the findings of its 2022 cybersecurity benchmarking study which analyzed the cybersecurity strategies and results of 1,200 large organizations across 14 different sectors and 16 countries, representing $125.2 billion of annual cybersecurity spending. The research revealed that the pandemic has brought cybersecurity to a critical inflection point. The number of material breaches respondents […]

Continue Reading

21 Million Records of VPN Users Leaked on Telegram

The database containing 10GB worth of user information of three VPN services such as ChatVPN, SuperVPN, and GeckoVPN was leaked in the Telegram Groups. On May 7th, 2022, the data of 21 million users was leaked, exposing the personal details and login credentials of the users. The Data Breach: Telegram uses encryption and offers its […]

Continue Reading

Siloed technology management increases operational blind spots and cyber risk

Oomnitza revealed a snapshot survey, conducted by Gatepoint Research, which found that siloed technology management is increasing operational blind spots and cyber risk. While 76% of enterprises employ multiple systems to oversee the underlying technology that supports their IT and business services, 71% of IT leaders anticipate increased security breaches and operational expenditures. According to […]

Continue Reading

Email encryption flexibility builds customer trust and business revenue

Intentional and unintentional data breaches in emails are not unusual, and since they are the backbone of communication, organizations need to keep their data protected. Echoworx’s release of a commissioned study conducted on their behalf by Forrester Consulting reveals the evolution of email security strategies and the importance of user experience. Echoworx provides email encryption […]

Continue Reading

Manage and monitor third-party identities to protect your organization

SecZetta shared a research that demonstrates a clear misalignment between the strategies organizations currently use and what is actually required to protect them from cyberattacks due to third-party vulnerabilities. Monitor third-party identities and non-human workers At a time when cyberattacks are increasing in size, frequency, and impact, this research found most organizations are not taking […]

Continue Reading