Please turn on your JavaScript for this page to function normally.
Kubernetes
How to properly adopt and manage Kubernetes in production

Kubernetes is a very important technology in the marketplace because vendors, ISVs, end users and enterprises are all able to come together and use this common infrastructure …

laptop
Board members and the C-suite need secure communication tools

Board members and the C-suite are key targets for cyber-threat actors, due to their access to highly sensitive information. Yet too many of them are putting their …

Tools
How tool sprawl is becoming a common issue for SMEs

JumpCloud announced the findings from its Q2 2022 SME IT Trends Report, revealing that while IT teams are successfully managing hybrid-remote work, they are still burdened …

backup
Data recovery depends on how good your backup strategy is

99% of surveyed IT decision makers state they have backup strategies in place, but just 26% have admitted they were unable to fully restore all data/documents when recovering …

Cloud
Increased security driving investments in cloud computing

Aptum has announced a report which examines the complexities inherent in hybrid cloud environments and their implications on security, data governance, compliance and disaster …

week in review
Week in review: Microsoft fixes Follina, cybersecurity pros quitting, (IN)SECURE Magazine RSAC 2022

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: (IN)SECURE Magazine: RSAC 2022 special issue released Several of the most …

Businesses deal with increasing bot attacks

Netacea released its report into how businesses are dealing with bot attacks. It reveals one key area where businesses are failing to tackle bot attacks — bots are going …

atlassian confluence
Criminal IP analysis report on zero-day vulnerability in Atlassian Confluence

According to Volexity, a webshell was discovered in Atlassian Confluence server during an incident response investigation. Volexity determined that it was a zero-day …

money
How financial institutions are improving customer experience with fraud prevention measures

Fraud is a persistent threat, and there’s no end in sight as the e-commerce landscape continues to evolve and the use of online payment platforms increases. According to one …

programmer
Cyber criminals continue to target and exploit people

Proofpoint unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk — vulnerability, attacks, and privilege — …

iPhone
Fraud trends and scam tactics consumers should be aware of

If it seems like you’re receiving more spam than normal, you probably are. Seventy-four percent of consumers say they have received a scam text so far this year, while as many …

66% of organizations store 21%-60% of their sensitive data in the cloud

A Thales report, conducted by 451 Research, reveals that 45% of businesses have experienced a cloud-based data breach or failed audit in the past 12 months, up 5% from the …

Don't miss

Cybersecurity news