Please turn on your JavaScript for this page to function normally.
syringe
Vaccinate your data: Addressing and adapting to new data risks

It seems like only yesterday that we were all reading up on what the implementation of the European Union’s General Data Protection Regulation (GDPR) would mean for businesses …

iPhone
Protect your smartphone from radio-based attacks

By now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone …

biohazard
Half of organizations are ineffective at countering phishing and ransomware threats

Half of US organizations are not effective at countering phishing and ransomware threats, Osterman Research research reveals. The findings come from a study compiled from …

employee
How to balance employee IT security policies

Hysolate announced the release of its latest enterprise security study exploring 200 enterprise IT and security leaders’ views on enterprise priorities for ensuring secure …

tools
Application security tools ineffective against new and growing threats

A study by Fastly and ESG, based on insights from information security and IT professionals representing hundreds of organizations globally, revealed growing concerns around …

cloud
Outsourcing cloud management driven by increasingly complex IT environments

Enterprises across the globe are turning to cloud outsourcing providers to manage their private and hybrid cloud infrastructure because of increasingly complex IT …

business
Worldwide AIOps market size to grow steadily by 2027

The global AIOps market size is projected to reach $23.9 billion by 2027, from $4.0 billion in 2020, at a CAGR of 30% during 2021-2027, according to Valuates Reports. Major …

week in review
Week in review: 5 popular cybersecurity exploitation techniques, new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, articles and interviews: (IN)SECURE Magazine issue 69 released (IN)SECURE Magazine is a free …

medical
How to strike the balance between privacy and personalization in healthcare and beyond

The trade-off between widespread technology adoption and responsible use often lies on the spectrum of privacy. When it comes to technologies fueled by data, such as …

mind map
The rise of the Developer Experience Engineer, and why it matters

In a world that increasingly relies on digital products, software development is becoming the catalyst for value creation and achieving top-line business results. At each …

person
Physical threats increase as employees return to the office

As COVID-19 vaccinations continue, companies embrace hybrid work, employees return to the office and the U.S. opens up, violence and physical threats to businesses are …

57% of reported incidents are caused by insiders

Insider data breaches were the top cause of data and cybersecurity incidents reported in the first quarter of 2021, according to the ICO. 57% of reported incidents were caused …

Don't miss

Cybersecurity news