Please turn on your JavaScript for this page to function normally.
encryption
How do I select a remote access solution for my business?

Protecting the remote workforce will be enterprises’ prime focus in 2021, according to a recent survey of IT leaders. IT teams struggled in the early days of the pandemic, …

Cybersecurity risk management
Organizations can no longer afford a reactive approach to risk management

Board members and C-suite executives around the globe are most concerned in 2021 with risks associated with COVID-19-related government policies and regulations, economic …

remote workforce protection
Empowering a remote workforce is a top priority for CEOs

A top challenge for many CEOs over the next few years is managing a remote workforce, a new IBM Institute for Business Value (IBV) study reveals. CEOs of outperforming …

fake news
Researchers develop approach that can recognize fake news

Social media is increasingly used to spread fake news. The same problem can be found on the capital market – criminals spread fake news about companies in order to …

person
Identity verification market to grow steadily in the next few years

The identity verification market is expected to grow at a CAGR of 13.1% over the forecast period 2020 to 2025, according to ResearchAndMarkets. Adoption of solutions through …

week in review
Week in review: Top 10 most exploited vulns, SMB ransomware extortion, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news and articles: SolarWinds Orion exploited by another group of state-sponsored hackers Another group …

patch
February 2021 Patch Tuesday forecast: The human communication aspect

We spend a lot of time each month discussing the technical details surrounding vulnerabilities, software updates, and the tools we use for patch management in our …

connected car
The transportation sector needs a standards-driven, industry-wide approach to cybersecurity

Despite the uncertainties of the last year, the transformation of the transportation sector forged ahead, dominated by the prevailing trend of CASE (Connected, Autonomous, …

data
Data loss prevention strategies for long-term remote teams

Before the recent pandemic, many executives began appreciating the risks and opportunities associated with cybersecurity. A 2019 survey on cybersecurity priorities from Optiv …

industry
Number of ICS vulnerabilities disclosed in 2020 up significantly

Throughout the second half (2H) of 2020, 71% of industrial control system (ICS) vulnerabilities disclosed were remotely exploitable through network attack vectors, according …

Terminal
Enterprises average one root access orphan key on every enterprise server

SSH machine identities are critical to digital transformation strategies, as they authenticate privileged access between machines and are ubiquitous across enterprise …

tools
API adoption is on the rise across all industries

Developer reliance on APIs increased over the past year amidst the global pandemic and will continue to increase in 2021, a RapidAPI survey reveals. Organizations of all sizes …

Don't miss

Cybersecurity news