Please turn on your JavaScript for this page to function normally.
cloud money
Cloud adoption growing steadily, but cost and regulatory challenges remain

O’Reilly announced the findings of a survey report which explores the latest trends in cloud, microservices, distributed application development, and other critical …

Test your CCSP knowledge with interactive flash cards
Test your CCSP knowledge with interactive flash cards

The (ISC)² Certified Cloud Security Professional (CCSP) stands out as the industry’s premier cloud security credential and broadens your operational knowledge beyond …

patch
November 2021 Patch Tuesday forecast: More mandates in the United States

The global holiday season is upon us with Diwali happening now, Thanksgiving the end of the month, and then on to Christmas and New Years! But before we all start celebrating, …

SIEM
Why integrating SIEM tools is crucial to managing threats

Maintaining cybersecurity for organizations has never been more complex; now that remote and hybrid work has become the norm, access to a company’s network is no longer …

industrial
Unseen gatekeepers: Industrial software providers’ role securing global infrastructure

National infrastructure in almost every Western country has come under attack by threat actors in the last few years. These attacks have grabbed the attention of businesses, …

insider threat
80% of organizations experienced employees misusing and abusing access to business apps

Organizations continue to operate with limited visibility into user activity and sessions associated with web applications, despite the ever-present risk of insider threats …

phishing
Mobile phishing exposure in the energy industry surged 161% in 2021

Mobile phishing exposure surged 161% within the energy industry between the second half of 2020 and the first half of 2021, a Lookout report reveals. The research indicates …

People
Younger generations care little about cybersecurity

SailPoint released a survey which aimed to identify gaps within organizations’ cybersecurity postures by analyzing workforce behaviors that blur work and personal lives, …

architecture
Security teams need to become more proactive and risk-driven

83% of companies would suffer business damage during the first 24 hours of an outage and thereafter, which comes as no surprise with recent surges in ransomware and other …

week in review
Week in review: CVE + MITRE ATT&CK methodology, new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, articles and interviews: (IN)SECURE Magazine issue 70 released (IN)SECURE Magazine is a free …

fix
Software development: Why security and constant vigilance are everyone’s responsibilities

An report from May 2021 has found that 81% of developers admit to knowingly releasing vulnerable apps, and 76% experienced pressure to sacrifice mobile security for …

criminal
77% of rootkits are used for espionage purposes

In a new report, Positive Technologies analyzes this past decade’s most infamous families of rootkits – programs that hide the presence of malicious software or …

Don't miss

Cybersecurity news