Please turn on your JavaScript for this page to function normally.
Red Piranha Crystal Eye XDR 4.0
Stand up your SOC with Crystal Eye XDR: Lift your security monitoring and incident response maturity

For most companies, the security journey often starts with assessments, policy review and awareness training so staff can deal with attacks on our infrastructure. Then, we …

code
Financial services need to prioritize API security to protect their customers

Noname Security and Alissa Knight, Partner at Knight Ink and recovering hacker, announced a research which unveils a number of vulnerabilities in the banking, cryptocurrency …

lock
Confidential computing market to reach $54 billion in 2026

The confidential computing market is projected to grow at a CAGR of 90%-95% to reach $54 billion in 2026, according to findings from a market study by Everest Group. …

week in review
Week in review: Popular npm package hijacked, zero trust security key tenets, wildcard certificate risks

Here’s an overview of some of last week’s most interesting news, articles and interviews: Apple fixes security feature bypass in macOS (CVE-2021-30892) Apple has …

industry
Three OT security lessons learned from 2021’s biggest cyber incidents

What do an oil pipeline, a water treatment plant, and a railway system have in common? They each rely on operational technology (OT) environments, and they were all victims of …

collaboration
Safeguarding the B2B sharing economy

Most people are familiar with business-to-consumer (B2C) sharing economy companies such as Uber, Airbnb, and DoorDash, but what you may not know is that this fast-growing, …

application
Employers must balance productivity and collaboration tools with security

Americans are more concerned about cybersecurity than ever before, according to Unisys. The survey found that concerns around internet security (including computer viruses and …

account
Unauthorized account openings increased by 21% in the last 12 months

Fifty-eight million consumers had a new account opened without their authorization in the last 12 months, a 21% increase compared to 2020, yet less than half of Americans know …

hands
Despite large investments in security tools, organizations are not confident they can stop data exfiltration

An Osterman Research survey of 255 cybersecurity professionals (CIOs, IT managers, CISOs and security managers), exploring attitudes and perceptions surrounding data …

cube
Regulation fatigue: A challenge to shift processes left

Recent high-profile supply chain attacks have heightened the need for increased regulation of the open-source community. In the U.S., for example, President Biden’s …

skull binary
API attacks are both underdetected and underreported

Akamai released a research into the evolving threat landscape for application programming interfaces (APIs), which according to Gartner will be the most frequent online attack …

Is offensive testing the way for enterprises to finally be ahead of adversaries?

The one principle the cyber-security industry is founded on is that defenders are always a step behind the hackers. Solutions are developed (FW, AV and onwards), technologies …

Don't miss

Cybersecurity news