Please turn on your JavaScript for this page to function normally.
hunt
Using mobile networks for cyber attacks as part of a warfare strategy

AdaptiveMobile Security published a research which highlights how vulnerabilities in mobile network infrastructure could be weaponized in offensive military operations. …

magnify
The importance of implementing security scanning in the software development lifecycle

Veracode published a research that finds most applications are now scanned around three times a week, compared to just two or three times a year a decade ago. This represents …

account
Online fraud skyrocketing: Gaming, streaming, social media, travel and ecommerce hit the most

An Arkose Labs report is warning UK commerce that it faces its most challenging year ever. Experts analyzed over 150 billion transaction requests across 254 countries and …

laptop
What is fueling digital anxiety when working remotely?

Working from home has spiked since the onset of the Covid-19 pandemic in March of 2020. This effort to reduce health risks may have limited the spread of the virus, but …

numbers
Encryption management solutions market to grow steadily by 2025

The encryption management solutions market is expected to increase by $6.07 billion from 2020 to 2025, and the market’s growth momentum will accelerate at a CAGR of …

week in review
Week in review: Malware targeting Linux-based OSes, Log4j exploitation risk

Here’s an overview of some of last week’s most interesting news, articles and interviews: Log4j exploitation risk is not as high as first thought, cyber MGA says …

cloud
Cloud security training is pivotal as demand for cloud services explode

Change is afoot. The private, public and third sector are transitioning from on-premises and datacenter-hosted infrastructure to hybrid architectures utilizing …

hole
The most common cyber gaps threatening supply chain security

Panorays has identified the top five most common cyber gaps among third-party organizations over 2021. Analyzing data gathered from cyber posture evaluations of tens of …

hands
How to prepare your organization for this year’s cybersecurity incidents

Sotero has shared its top five predictions for data security and privacy in 2022. Cybersecurity incidents have risen 125% year over year and will continue to grow …

AI
AI can spot biometric spoofing attacks with ease

Humans have far greater difficulty identifying images of biometric spoofing attacks compared to computers performing the same task, according to research released by ID …

programmer
Execs concerned about failing to deliver working arrangements that meet employee expectations

Executives are concerned about their ability to deliver value propositions that satisfy employees and a subsequent inability to retain and recruit talent, according to …

cloud
Organizations and the cloud: How they use it and how they secure it

The Cloud Security Alliance (CSA) released the findings of its latest survey which offers insight into companies’ plans regarding cloud and security strategy, cloud services, …

Don't miss

Cybersecurity news