Please turn on your JavaScript for this page to function normally.
online shop owned
API abuses and attacks create new challenges for retailers

Imperva releases The State of Security Within eCommerce 2022 report, a 12-month analysis by Imperva Threat Research of cybersecurity threats targeting the retail industry. …

spotlight
Red, purple, or blue? When it comes to offensive security operations, it’s not just about picking one color

When people find out that I’ve spent much of my career being hired by companies to steal their secrets, they usually ask, “Are we doing enough? Do we need a red team?” …

compliance
Compliance initiatives can advance your organization’s security journey

Compliance standards are designed to give organizations a foundational approach to designing their security program while also reassuring third parties that you have met at …

video call
Remote work pushes video conferencing security to the fore

IT professionals are becoming increasingly concerned about the growing number of cyber threats and foreign attacks capable of impacting video conferencing. In this Help Net …

DevSecOps
Security leaders want consequences for insecure code

Organizations plan to invest in DevSecOps in 2023, and the level of urgency for them to do so has grown. In a recent survey conducted by the Neustar International Security …

wolf
How ransomware gangs and malware campaigns are changing

Deep Instinct released its 2022 Bi-Annual Cyber Threat Report which focuses on the top malware and ransomware trends and tactics from the first half of 2022 and provides key …

ransomware
Ransomware is the biggest concern for most organizations

SonicWall released the 2022 SonicWall Threat Mindset Survey which found that 66% of customers are more concerned about cyberattacks in 2022, with the main threat being focused …

2FA 3FA MFA
2FA, 3FA, MFA… What does it all mean?

Simply put, authentication is the act of proving you are who you say you are. To gain access to protected information, systems or locations, the user must prove their identity …

threat modeling
What is software threat modeling and how to use it effectively

The importance of software threat modeling continues to grow. NIST advises software engineers to adhere to secure software development best practices and do software threat …

insider threat
Shining a light on the dark web

Dark web marketplaces sell a plethora of tools, stolen data, and forged documents, and some of the things for sale are priced higher than the rest. The most expensive records …

USA
Security “sampling” puts US federal agencies at risk

Titania launched an independent research report that uncovers the impact of exploitable misconfigurations on the security of networks in the US federal government. The study, …

2022 Cloud Data Security Report
2022 Cloud Data Security Report

Security teams are in charge of their company’s most important asset – data. Their mission is to make sure they discover and remediate all of the data-related risks and keep …

Don't miss

Cybersecurity news