Please turn on your JavaScript for this page to function normally.
Develop a cybersecurity team
Want to assemble a cyber Dream Team? Look back at the ‘92 Olympics

A common question I often receive from organizational leaders is how to assemble the right team that can ensure their enterprise is positioned to effectively combat the …

user
Digital IDs don’t have to impinge on civil liberties and privacy

The shift towards an increasingly digital world has become overwhelmingly apparent. The coronavirus era has forced a technological leap on all fronts, and incumbent …

immudb
Immudb: Open-source database, built on a zero trust model

Now, with full transactional support for everyday business applications, the open source immudb tamper-proof database can serve as the main transactional database for …

cloud complexity
Why is a well thought-out approach to cloud migration imperative?

The big move to the cloud is bringing as many challenges as opportunities, a database monitoring survey from Redgate has found. With 80% of organizations now using a mix of …

stats
European UCaaS market to gain momentum in 2022

A ResearchAndMarkets study provides an in-depth analysis of trends, growth factors and growth opportunities in the European UCaaS market. UCaaS providers will pursue untapped …

Log4j
The impact of the Log4j vulnerability on OT networks

Operational Technology (OT) networks are at risk from the recently-announced Apache Log4j (CVE-2021-44228) vulnerability. On the surface, it is not clear why this should be. …

fix
How to implement security into software design from the get-go

Software professionals know that the working relationship between developers and security teams can be complicated. Most security professionals feel it’s part of a …

EU
Europe’s quantum communication plans: Defending against state-sponsored cyber attacks

State-sponsored cyberattacks are on the rise and are a significant part of the future of warfare. Why would a nation send humans to a frontline when it can take out the …

data
When done right, network segmentation brings rewards

96% of organizations claim to be implementing segmentation in their networks, yet only 2% of those organizations are segmenting all six mission-critical asset classes, …

shop online
Online shopping at risk: Mobile application and API cyber attacks at critical high

Protecting mobile applications and APIs against automated threats is a top priority for online commerce businesses, according to data from a study published by DataDome. …

keyboard
Security priorities are geared toward ongoing remote and hybrid work

Nearly two years into the pandemic, SME IT admins report they’re considered an important voice in company operations and fewer are feeling overwhelmed despite facing continued …

5G
Adoption of private 5G networks accelerates, as organizations look to improve security and speed

There’s a significant interest in private 5G networks, with 90% of executives expecting that private 5G will become the standard network choice, according to an …

Don't miss

Cybersecurity news