Please turn on your JavaScript for this page to function normally.
CEO
Threats emanating from digital ecosystems can be a blind spot for businesses

Cyber executives may not be sufficiently prioritizing threats from vulnerabilities within the value chain, beyond the immediate boundaries of their own organizations, …

network
Now is the time to focus on software supply chain security improvements

The shift to cloud-native development, along with the increased speed in development brought about by the adoption of DevOps processes, has made the challenges connected with …

Phishing
The most impersonated brand in phishing attacks? Microsoft

Vade announced its H1 2022 Phishers’ Favorites report, a ranking of the top 25 most impersonated brands in phishing attacks. Microsoft came in at #1 on the list, followed by …

CIS
Test your security configuration with a free assessment tool from CIS

CIS-CAT Lite is the free assessment tool developed by the CIS (Center for Internet Security), which helps users implement secure configurations for multiple technologies. With …

compliance
Most companies are unprepared for CCPA and GDPR compliance

As of June 30, 2022, 91% of companies across all verticals, states, and business size that must comply with CCPA are still unprepared to meet CCPA requirements, according to …

week in review
Week in review: Attackers abandoning malicious macros, average data breach cost soars

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Israel’s new cyber-kinetic lab will boost the resilience of critical …

cyber insurance
Ransomware looms large over the cyber insurance industry

A Panaseer survey of global insurers across the UK and US found that 82% are expecting the rise in premiums to continue, with 74% of insurers agreeing that their inability to …

attacks
Why there is no quick fix for cyber attacks

Cybersecurity threats keep evolving, meaning that most, if not all, organizations could be dangerously exposed as the digital ecosystem develops. While some organizations …

lock
Researchers create key tech for quantum cryptography commercialization

In modern cryptosystems, users generate public and private keys that guarantee security based on computational complexity and use them to encrypt and decrypt information. …

Data
Using real customer data in testing environments creates unnecessary risk

A new study polling 1,000 software developers and startup employees found 29% of companies use unprotected production data (real customer data) in testing environments when …

Kubernetes
Kubernetes security: Shift-left strategies and simplifying management

Kubernetes (K8s) is undoubtedly on the rise. According to the State of Cloud Development report by SlashData, this open-source container orchestration platform is already …

industrial
Cybersecurity is becoming a top priority among critical infrastructure operators

Increased cyber threats and government directives have made cybersecurity a top priority among critical infrastructure organizations. This Help Net Security video highlights …

Don't miss

Cybersecurity news