Please turn on your JavaScript for this page to function normally.
cloud
The perils of over-reliance on single cloud providers

The risk associated with dependence on a particular cloud provider for multiple business capabilities is in the top five emerging risks for organizations for the second …

Kubernetes
The role of Kubernetes in modern app management

Kubernetes, often abbreviated as K8s, is an open-source container orchestration platform that has redefined the way modern applications are developed, deployed, and managed. …

week in review
Week in review: Exploited Citrix Bleed vulnerability, Atlassian patches critical Confluence bug

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: AI threat landscape: Model theft and inference attacks emerge as top concerns …

New infosec products of the week
New infosec products of the week: November 3, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Action1, Enzoic, Immuta, and Snappt. Immuta Discover identifies and classifies …

email
How cybercriminals adapt and thrive amidst changing consumer trends

The email threat landscape is experiencing a profound transformation, adapting to new challenges and exploiting emerging vulnerabilities with speed and sophistication. In this …

Healthcare
Healthcare’s road to redefining cybersecurity with modern solutions

The rate of data encryption following a ransomware attack in healthcare was the highest in the last three years, according to Sophos. Ransomware attacks continue to grow in …

money
Financial organizations embrace automation for enhanced security

The security performance of financial applications generally outperforms other industries, with automation, targeted security training, and scanning via Application …

artificial intelligence
AI is transforming financial crime compliance

While 86% of compliance, operations, risk and IT professionals at banks and non-banking financial institutions (NBFIs) surveyed said they would increase spending on AI and ML …

cybersecurity staff shortages
Cybersecurity workforce shortages: 67% report people deficits

The global cybersecurity workforce has reached 5.5 million people, an 8.7% increase from 2022, representing 440,000 new jobs, according to ISC2. While this is the highest …

laptop
6 steps to accelerate cybersecurity incident response

Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad actors still occasionally find a …

patch
Why legacy system patching can’t wait

The persistent neglect of patching legacy systems is plaguing critical infrastructure and industries. The consequences of such neglect can be damaging to organizations, …

businessman computer
Cybersecurity habits and behaviors executives need to be aware of

Top executives — the employee group most targeted by threat actors — are frequently provided unfettered access to valuable data sources and networked assets, according to …

Don't miss

Cybersecurity news