Please turn on your JavaScript for this page to function normally.
open source
Open-source software fosters innovation, but only with the right controls in place

In businesses of all sizes, open-source software is a crucial component of the software supply chain, but the OSS supply chain is also facing new security issues – calling for …

hands
Cybersecurity recovery is a process that starts long before a cyberattack occurs

While most organizations have insurance in case of cyberattacks, the premium they pay depends on how the business identifies, detects and responds to these attacks – and …

password
Businesses want technologies that allow for passwordless workflows

Bitwarden announced the results of its 2023 Password Decisions Survey, which polled 800 IT decision makers across a wide range of industries, showing that passwordless …

money
Group indicted for breaching CPA, tax preparation firms via stolen credentials

United States Attorney Roger B. Handberg announces the partial unsealing of an indictment charging eight individuals with Racketeer Influenced and Corrupt Organizations (RICO) …

drown
How to deal with burnout when you’re the CISO

CISOs are working overtime and can’t always switch off from work, according to a recent Tessian report. Recent headlines have shown that security stakes have never been …

cloud
Alternatives to a lift-and-shift cloud migration strategy

For most organizations operating in today’s digital landscape, shifting even their most mission-critical workloads from traditional on-premises or colocation-based data …

businessman
32% of cybersecurity leaders considering quitting their jobs

32% of CISOs or IT Security DMs in the UK and US are considering leaving their current organization, according to a research from BlackFog. Of those considering leaving their …

CIS Hardened Images
Whitepaper: Shared responsibility model for cloud security

With high chances of user error, limited security resources, and constantly evolving computing environments, commercial and public organizations need cybersecurity resources …

IDC Analyst Brief
IDC Analyst Brief reveals how passwords aren’t going away

Passwords are the keys to the kingdom. Hardening the password security layer requires a multistep approach. img …

open source security
Following Log4j: Supporting the developer community to secure IT

How bad was the Log4j vulnerability for open source’s reputation? One of the most high-profile exploits in recent years, it even led to a government advisory from the UK’s …

application
Most missed area of zero trust: Unmanageable applications

In this Help Net Security video, Matthew Chiodi, Chief Trust Officer of Cerby, talks about the likely hole in your security strategy. This video zeroes in on one of the most …

You can up software supply chain security by implementing these measures

The COVID-19 pandemic has been a driving force in digital acceleration, and it continues to wield its influence in how organizations and their staff embrace work. In the push …

Don't miss

Cybersecurity news