Please turn on your JavaScript for this page to function normally.
Good
Is that health app safe to use? A new framework aims to provide an answer

A new framework for assessing the privacy, technical security, usability and clinical assurance and safety of digital health technologies has been created by the American …

Eyes
Google Drive emerges as top app for malware downloads

Netskope published a research which found that phishing downloads saw a sharp increase of 450% over the past 12 months, fueled by attackers using search engine optimization …

password
Password reuse is rampant among Fortune 1000 employees

SpyCloud published an annual analysis of identity exposure among employees of Fortune 1000 companies in key sectors such as technology, finance, retail and telecommunications. …

Download guide: Evaluating third-party security platforms

A comprehensive third-party security program can align your vendor’s security with your internal security controls and risk appetite. Such a program can also help you …

Threats to hardware security are growing

Hardware attacks are becoming more and more sophisticated. There are several reasons this could be happening: Security increasingly supported in hardware – Mistakes can …

insider threat
How to set up a powerful insider threat program

Security spend continues to focus on external threats despite threats often coming from within the organization. A recent Imperva report (by Forrester Research) found only 18 …

phishing
Welcome “Frappo” – Resecurity identified a new Phishing-as-a-Service

The Resecurity HUNTER unit identified a new underground service called “Frappo”, which is available on the Dark Web. “Frappo” acts as a Phishing-as-a-Service and enables …

woman
Funding women-led cybersecurity startups: Where are we at?

In 2020, cybersecurity companies raised $8.9 billion globally, and in 2021 the amount jumped (significantly) to over $21 billion. While the data is very exciting and promising …

lock
The role of streaming machine learning in encrypted traffic analysis

Organizations now create and move more data than at any time ever before in human history. Network traffic continues to increase, and global internet bandwidth grew by 29% in …

week in review
Week in review: F5 BIG-IP flaw, critical bugs in Aruba and Avaya network switches, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles and interviews: May 2022 Patch Tuesday forecast: Look beyond just application and OS updates April …

patch
May 2022 Patch Tuesday forecast: Look beyond just application and OS updates

April Patch Tuesday provided an extensive set of operating system and application updates after a few quiet months. Microsoft addressed 97 vulnerabilities in Windows 10, and …

cloud
Smart government agencies are opting for multicloud environments

In recent years, there had been more cyberattacks, ransomware events, and an ongoing discovery of potential vulnerabilities within an IT infrastructure. In addition, the …

Don't miss

Cybersecurity news