Please turn on your JavaScript for this page to function normally.
cloud
Alternatives to a lift-and-shift cloud migration strategy

For most organizations operating in today’s digital landscape, shifting even their most mission-critical workloads from traditional on-premises or colocation-based data …

businessman
32% of cybersecurity leaders considering quitting their jobs

32% of CISOs or IT Security DMs in the UK and US are considering leaving their current organization, according to a research from BlackFog. Of those considering leaving their …

CIS Hardened Images
Whitepaper: Shared responsibility model for cloud security

With high chances of user error, limited security resources, and constantly evolving computing environments, commercial and public organizations need cybersecurity resources …

IDC Analyst Brief
IDC Analyst Brief reveals how passwords aren’t going away

Passwords are the keys to the kingdom. Hardening the password security layer requires a multistep approach. img …

open source security
Following Log4j: Supporting the developer community to secure IT

How bad was the Log4j vulnerability for open source’s reputation? One of the most high-profile exploits in recent years, it even led to a government advisory from the UK’s …

application
Most missed area of zero trust: Unmanageable applications

In this Help Net Security video, Matthew Chiodi, Chief Trust Officer of Cerby, talks about the likely hole in your security strategy. This video zeroes in on one of the most …

You can up software supply chain security by implementing these measures

The COVID-19 pandemic has been a driving force in digital acceleration, and it continues to wield its influence in how organizations and their staff embrace work. In the push …

Work
What developers want and how to keep them on your team

OutSystems released a new developer jobs report identifying the factors that motivate them to stay with their companies and the frustrations that drive them away. The report, …

bomb
Will cyber saber-rattling drive us to destruction?

As cyberattacks have grown increasingly destructive, nations are entertaining the idea of responding to them with conventional military forces. It is difficult to determine …

cryptocurrency
Scams targeting cryptocurrency enthusiasts are getting more prevalent

Crypto giveaway scams have evolved into an illicit market segment with multiple services that aim to facilitate fraudulent operations. The growth of fake crypto giveaways can …

healthcare
Cyberattacks in healthcare sector more likely to carry financial consequences

Netwrix announced additional findings for the healthcare sector from its global 2022 Cloud Security Report, revealing that 61% of respondents in the healthcare industry …

week in review
Week in review: OpenSSL critical fix, Medibank data breach, Apple fixes zero-day vulnerability

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Incoming OpenSSL critical fix: Organizations, users, get ready! The OpenSSL …

Don't miss

Cybersecurity news