Cyberattackers target people. They exploit people. Ultimately, they are people. That’s why the Human Factor report focuses on how technology and psychology combine to make people so susceptible to modern cyber threats. In this first volume, we take a closer look at attacks that rely on social engineering, including business email compromise (BEC) threats, email fraud and phishing.
Cybersecurity threats against healthcare facilities continue to rise. In this annual survey, Ponemon dives deep into the cybersecurity risks faced by the industry and their impact on patient care.
Data loss is a people problem Zero-day attacks and unpatched vulnerabilities make a lot of headlines. But the results of our inaugural 2024 Data Loss Landscape report show that people are the root cause of most data loss incidents.
Find out how vulnerable your users are to today’s biggest cyber threats in the 2024 State of the Phish report. Learn phishing trends, key insights, statistics, and more.
In today’s digital economy, privileged identities are the keys to your organization’s most valuable assets—and a top vector for
Identity is the top attack vector for healthcare providers. Cyber criminals have learned sophisticated ways to steal user credentials. And tools like single sign-on and multifactor authentication often can’t stop them from gaining access to sensitive data.
State-sponsored attacks. Major-league malware. Phishing for cryptocurrency. These are just a few of the trends highlighted in the newest edition of our biannual threat summary.
Cyber Insecurity in Healthcare: The Cost and Impact on Patient Safety and Care Healthcare IT and security professionals have spoken. Ponemon listened.
In our latest social engineering report, Proofpoint researchers analyze key trends and behaviors in
Phishing doesn’t get the attention it deserves. Attackers use it—and other tactics—to steal credentials, spread malware and commit fraud. But you can protect against email-borne threats with Forrester’s layered approach.
Cyber criminals are getting bolder and more sophisticated with their threats.
Cyber criminals are getting bolder and more sophisticated with their threats. As more business assets move to the cloud, attackers have followed close behind. This cloud account compromise threat brief will help you understand: