Please turn on your JavaScript for this page to function normally.
The importance of implementing continuous security in the development lifecycle

A research from Wabbi and IDG found that companies which utilize continuous security have seen a 50% decrease in vulnerabilities. As the number of attacks increase daily, it …

user
Web3 and the future of data portability: Rethinking user experiences and incentives on the internet

Tech conversations are now peppered with a new, contentious buzzword: Web3, and we’re all likely to hear a lot more of it in the coming years. It’s an umbrella term for …

cybersecurity
Product showcase: Secure online authentication “Made in Germany” by Swissbit

New iShield FIDO2 USB-A / NFC security key protects access to applications and online services. Today it is more critical than ever before for businesses to equip themselves …

insider threat
Posts on name-and-shame dark web leak sites climbed 85% in 2021

Ransomware payments hit new records in 2021 as cybercriminals increasingly turned to dark web leak sites where they pressured victims to pay up by threatening to release …

hardware
The benefits of implementing continuous security in the development lifecycle

Wabbi published new research with IDG that finds companies utilizing continuous security have decreased vulnerabilities by 50%. The study focused on the integration of …

apple
How hard is it to address Apple’s in-app deletion requirements and implement privacy compliance?

Transcend released the results of its latest survey of technology decision makers, which assessed their readiness for Apple’s in-app deletion requirements for iOS apps that …

DevOps
DevOps market to exceed $30 billion by 2028

The DevOps market is expected to surpass $30 billion by 2028, as reported in a research study by Global Market Insights. The growing demand to minimize system development …

secure
Design, prioritize, and implement a cyber defense program with CIS CDM 2.0

The Center for Internet Security (CIS) Community Defense Model (CDM) v2.0 can be used to design, prioritize, implement, and improve an enterprise’s cybersecurity program. …

COVID bounce: A massive 2021 resurgence of cyberthreats

2021 was marked by a massive resurgence of cyberthreats, with a 77% increase in malware detection over 2020, a Malwarebytes’ research revealed. Business-focused …

Many businesses lack a formal ransomware plan

Malware, ransomware and phishing are still the most common threats to organizations, a Thales research reveals. Worryingly, 22% of organizations have paid or would pay a …

money
The Israeli cybersecurity funding landscape in the past year

In this video for Help Net Security, Yonit Wiseman, Associate at YL Ventures, talks about the Israeli cybersecurity funding landscape in the past year. The Israeli …

lock
The security gaps that can be exposed by cybersecurity asset management

Cybersecurity asset management does not come with the excitement following the metaverse, blockchain, or smokescreen detection technologies, but it is essential for the …

Don't miss

Cybersecurity news