Please turn on your JavaScript for this page to function normally.
cloud
Application and cloud security is a shared responsibility

Cloud environments and application connectivity have become a critical part of many organizations’ digital transformation initiatives. In fact, nearly 40% of North American …

numbers
Expected advancements in quantum cryptography

Quantum computing has surged in popularity recently, with its revolutionary computational capabilities transforming the technology sector. While some are skeptical of its …

risk
High-risk users may be few, but the threat they pose is huge

High-risk users represent approximately 10% of the worker population and are found in every department and function of the organization, according to Elevate Security …

college
Challenging cost misconceptions in STEM education

Job seekers, students, and career changers around the world want to pursue roles related to science, technology, engineering, and mathematics (STEM) across different …

vectors
Attack surface management (ASM) is not limited to the surface

Another year of high-profile cyberattacks, another year of beating the cybersecurity drums. Clearly, we’re missing a few notes. Attack surface management (ASM) is a make or …

Cynomi vCiso
The risks and benefits of starting a vCISO practice

There is a definite trend of MSPs shifting into security. There are a number of very good reasons for this, including the fact that other services traditionally offered are …

swiss army knife
Malware that can do anything and everything is on the rise

“Swiss Army knife” malware – multi-purpose malware that can perform malicious actions across the cyber-kill chain and evade detection by security controls – is on …

DDoS
How to prevent DDoS attacks

The number of DDoS attacks we see around the globe is on the rise, and that trend is likely to continue throughout 2023, according to Corero. We expect to see attackers deploy …

bulb
Actionable intelligence is the key to better security outcomes

Despite the widespread belief that understanding the cyber threat actors who could be targeting their organization is important, 79% of respondents stated that their …

SaaS
Reimagining zero trust for modern SaaS

The concept of zero trust – as a way to improve the security of and access to an organization’s network, systems, and data – has gained traction in recent …

compliance
As regulations skyrocket, is compliance even possible anymore?

Let’s face it, security teams are only as good as the next problem they face. But why is keeping up so difficult? New/evolving requirements, lengthy/confusing acronyms, and …

Hand
Cybercriminals exploit fear and urgency to trick consumers

Cybercriminals remained active in spying and information stealing, with lottery-themed adware campaigns used as a tactic to obtain people’s contact details, according to …

Don't miss

Cybersecurity news