All the latest blog posts from the most relevant cyber security companies in the business.

Security has no shortage of metrics — everything from the number of vulnerabilities and attacks to the number of bytes per second in a denial-of-service attack. Now a new report focuses on how long it takes organizations to remediate vulnerabilities in their systems — and just how many of the vulnerabilities they face they’re actually…

RSA CONFERENCE 2019 – San Francisco – As more enterprise work takes place on mobile devices, more companies are feeling insecure about the security of their mobile fleet. That’s one of the big takeaways from Verizon’s “Mobile Security Index 2019,” released here this week. The report is based on responses from 671 enterprise IT professionals…

They haven’t completely replaced phone calls or email, but communication and collaboration apps are becoming increasingly popular. For workers today, who are in and out of the office, working on the go, with multiple team members, it’s all about convenience and ease of use. Many rely on Slack, Google Hangouts, Box, SharePoint, and other applications…

More than 6,500 data breaches were reported in 2018, a new report from Risk Based Security shows. The breaches, both big and small, were reported through Dec. 31, 2018 — marking a 3.2% decline from the 6,728 breaches reported in 2017 and making it the second-most active year for data breaches on record. Some 5…

Visa’s chief risk officer anticipates some positive changes ahead. Change that leads to improvement is usually good, in my opinion, and in my role at Visa, I anticipate some healthy changes ahead for the payment industry. Of course, no one can perfectly predict what is to come, but here is my take on four notable…

Consumer concern about cybersecurity and privacy is very real but not evenly distributed, a new report shows: while passwords and financial information are worrying for everyone, concern about other information varies widely depending on the individual’s age, gender, and national origin. The RSA Data Privacy & Security Survey 2019 of more than 6,000 adults contains…

Some cybercriminals are taking advantage of a long-standing feature in Google Gmail designed to enhance account security, to create multiple fraudulent accounts on various websites quickly and at scale, security vendor Agari said this week. The feature, which some have warned about previously, basically ensures that all dotted variations of a Gmail address belong to…

Containers represent the most significant computing advancements for enterprise IT since VMware introduced its first virtualization product, Workstation 1.0, in 1999. They enable organizations to build, ship, and run applications faster than ever, fueling the rise of the DevOps movement. It’s important for CISOs to realize that while containers can create more secure application development…

Distributed denial-of-service (DDoS) c do not have to be bandwidth-intensive to be disruptive and hard to mitigate. Earlier this month, Imperva mitigated an attack against one of its clients that exceeded 500 million packets per second, making it possibly the largest DDoS attack by packet volume ever recorded. The January 10 attack was a so-called…