Please turn on your JavaScript for this page to function normally.
identity theft
How to retain the best talent in a competitive cybersecurity market

We are currently experiencing The Great Resignation, where millions of people are leaving their jobs in search of increased satisfaction. The global pandemic gave many the …

data
What businesses need to know about data decay

Data decay is the aging and obsolescence of data in such a way that makes it no longer usable due to loss of its integrity, completeness, and accuracy. Data that can no longer …

zero trust
Zero trust security solutions widely adopted, spurred by surge in ransomware

Over a decade after the zero trust security concept was first introduced, Ericom’s survey results indicate that zero trust solutions are being widely adopted. Spurred by the …

ransomware
Ransomware still a primary threat as cybercriminals evolve tactics

Trend Micro announced that it blocked 40.9 billion email threats, malicious files, and malicious URLs for customers in the first half of 2021, a 47% year-on-year increase. …

Woman working on laptop
Tech pros reporting a positive perception of their roles, looking forward to what lies ahead

Amidst ongoing pandemic-driven change at work and at home, a SolarWinds survey seeks to understand how tech pros feel about their daily roles and responsibilities, the lessons …

upload
Cloud and online backups increasing in popularity, but tape usage remains

15% of organizations are still using a combination of disk and tape backups, with 51% now using online or cloud backups, a research by Databarracks has revealed. The annual …

SecTalks 2021
How do you measure the impact of security? Find out at SecTalks 2021

How are businesses learning, collaborating, and applying industry best practices? The half-day SecTalks 2021 virtual cybersecurity conference will look at how to quantify …

week in review
Week in review: Kali Linux 2021.3, how to avoid cloud configuration breaches, hybrid digital dexterity

Here’s an overview of some of last week’s most interesting news, articles and interviews: Apple fixes “zero-click” iMessage zero-day exploited to deliver spyware …

identity
The digital identity imperative

The ever-evolving shift to digital means that most of our day-to-day activities are carried out online. We’re now accustomed to simply toggling through a few apps to book a …

open source
Open source cyberattacks increasing by 650%, popular projects more vulnerable

Sonatype released a report that revealed continued strong growth in open source supply and demand dynamics. Further, with regard to open source security risks, the report …

highest paying it certifications
Highest paying IT certifications in 2021

A report on the skills and salaries of professionals in the technology sector reveals the true value of certification. It also identifies the number one reason for leaving a …

strategy
Modern security strategies key to support remote workforce demands

COVID-19 quickly ushered in the era of remote work, introducing new risks that IT professionals are struggling to manage with existing security tools, according to a Thales …

Don't miss

Cybersecurity news