This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
search
cart
facebook   twitter   linkedin   youtube  
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
    • Industry News
    • Women in Tech
    • Events Calendar
  • PRODUCTS
    • New Products
    • Editor’s Pick
  • TECHNOLOGIES
    • Cloud Computing
    • Cybersecurity
    • Edge Computing
    • Infrastructure
    • Power
    • 5G
  • OPERATIONS
    • Building Commissioning
    • Facility Design
    • Life Safety
    • Mission Sustainability
      • Code Green
    • Site Selection
    • Thermal Management
  • COLUMNS
    • Writing on the Edge
    • Unconventional Wisdom
    • On Target Series
    • Guest Column
      • Hot Aisle Insight
      • MC Skills Exchange
      • Real (Estate) Talk
  • MULTIMEDIA
    • Podcasts
    • Videos
    • Webinars
    • eNewsletter
  • CONTESTS
    • Top Tier Product Awards
    • Women in Technology
  • RESOURCES
    • Buyer's Guide
    • White Papers
    • Quizzes
    • Case Studies
    • Technical Advisory Board
    • Continuing Education
    • Store
    • Student Section
      • Training and Education
      • Glossary
    • Classifieds
    • DCEP
    • International Data Center Day
  • EMAGAZINE
    • eMagazine
    • Archived Issues
    • Contact Us
    • Advertise
    • Subscribe
Home » Keywords: » cyberattack

Items Tagged with 'cyberattack'

ARTICLES

DDoS-Protection-Market.jpg

DDoS attacks increased by 109% since last year

FMI released its DDoS protection market analysis report
March 27, 2023
No Comments

Because of the heightened connection provided by mobile and cloud computing, as well as the increasing threat of sophisticated assaults, there is a growing demand for DDoS protection solutions. 


Read More
News.jpg

At least 20% of enterprise endpoints have legacy security vulnerabilities

The Action1 survey reveals critical gaps in vulnerability management
March 24, 2023
No Comments

Based on feedback from 804 IT professionals, the report reveals critical gaps in vulnerability management within organizations, which are being overlooked by executive leadership teams despite high-profile breaches and increased emphasis on cybersecurity from the authorities. These gaps leave organizations vulnerable to cyber threats.


Read More
News.jpg

DNS security market to expand

Growing at a CAGR of 8.4% from 2023 to 2033
March 8, 2023
No Comments
  • By industry, the banking, financial services, and insurance (BFSI) industry is showing the highest growth with a dominant market share by 2032. However, the health care industry is projected to display a significant growth of around 10.9% between 2022 and 2032.

  • Read More
    Business email compromise

    Remote work and the rise of email compromise

    Business email is a critical application
    David trepp
    David Trepp
    February 27, 2023
    No Comments

    Businesses should make cybersecurity part of the conversation while making sure to thank employees, customers, and business associates for inherent inconveniences when implementing information security improvements. 


    Read More
    Phishing.jpg

    US businesses suffer from the lack of personal data privacy laws

    Dimitri shelest
    Dimitri Shelest
    February 23, 2023
    No Comments

    The payday from crimes against business can dwarf gains from crimes against individuals, making them especially attractive targets. Businesses are only as safe as their most digitally vulnerable employees. 


    Read More
    Dark web cyberrisks

    This is how much hacked streaming accounts cost on the dark web

    Apple Music and Disney+ have the biggest price tag
    February 2, 2023
    No Comments

    Streaming accounts typically contain not only the user's name, surname, date of birth, and contact information but also often have linked payment methods, making them a valuable target for cybercriminals.


    Read More
    RoyalMailAttack.jpg

    Ransomware attackers are setting the agenda in cybersecurity

    Companies must up their game on cyber awareness, says GlobalData
    January 17, 2023
    No Comments

    Following news that Royal Mail has been hit by a ransomware attack, David Bicknell, principal analyst on the Thematic Intelligence team at GlobalData, offers his view on how companies can improve their cybersecurity measures.


    Read More
    Cybersquat.jpg

    Cybersquatting cases reach record highs in 2022

    December 26, 2022
    No Comments

    Malicious actors abuse the importance of domain names by registering ones that are identical or similar to existing trademarks, company names, or personal names, hoping to profit from the confusion. It is called cybersquatting.


    Read More
    LegacySecurity.jpg

    Genetec shares best practices to protect legacy access control systems from cyberattacks

    Company alerts organizations to risks
    November 25, 2022
    No Comments

    Cybercriminals can exploit weaknesses in access control system credentials, controllers, servers, readers, or workstations connected to the network.


    Read More
    Phishing.jpg

    Almost half of financial institutions believe their own IT teams are the main risk to cloud security

    Only 30% of respondents from other industries are as concerned about the risks associated with their IT staff
    November 21, 2022
    No Comments

    All sectors say phishing is the most common type of attack they experience. 


    Read More
    More Articles Tagged with 'cyberattack'
    Subscribe For Free!
    • eMagazine
    • eNewsletter
    • Online Registration
    • Manage My Preferences
    • Subscription Customer Service

    More Videos

    Popular Stories

    Top 25 Women in Technology of 2023

    2023 Top 25 Women in Technology

    Melissa-Reali-Elliott.jpg

    We are the frog

    11-Beatriz-Jimenez-wit-780x439.jpg

    Beatriz Jimenez | A 2023 Top 25 Women In Technology Winner

    2023 Top Tier Products Awards

    Events

    October 11, 2022

    Cellular Glass Insulation’s Impact on Mission Critical Building Design

    On Demand This course discusses the performance properties of cellular glass insulation ideal for these facilities as well as example assemblies to help achieve redundancy and durability.


    EARN: 1 AIA LU/HSW; 0.1 IACET CEU; 1 PDH

    December 30, 2030

    Webinar Sponsorship Information

    For webinar sponsorship information, visit www.bnpevents.com/webinars or email webinars@bnpmedia.com.

    View All Submit An Event

    Products

    Location Location Connectivity

    Location Location Connectivity

    See More Products
    2023 Top 25 Women in Technology

    Get our new eMagazine delivered to your inbox every month.

    Stay in the know on the latest data center news and information.

    SUBSCRIBE TODAY!
    • Resources
      • Product Info (Free)
      • Security Group
      • Editorial Guidelines
      • List Rental
      • Survey And Sample
      • Custom Content & Marketing
      • Market Research
      • Partners
    • Want More
      • Connect
    • Privacy
      • PRIVACY POLICY
      • TERMS & CONDITIONS
      • DO NOT SELL MY PERSONAL INFORMATION
      • PRIVACY REQUEST
      • UPDATE MY PREFERENCES
      • ACCESSIBILITY

    Copyright ©2023. All Rights Reserved BNP Media.

    Design, CMS, Hosting & Web Development :: ePublishing