Please turn on your JavaScript for this page to function normally.
Car
Smart car security: Good practices to improve car safety

The automotive industry is undergoing an evolution towards connected and autonomous vehicles. Increasingly smart cars include added features that enhance users’ experience or …

identity theft
Growing complexity is driving operational changes to privacy programs

A majority of companies are adopting a single global data protection strategy to manage evolving privacy programs, and that managing the expanding ecosystem of third parties …

user
Developers worry about security, still half of teams lack an expert

While nearly 75% of developers worry about the security of their applications and 85% rank security as very important in the coding and development process, nearly half of …

shopping
Cybercriminals targeting e-commerce website vulnerabilities this holiday season

Expect unprecedented levels of online data theft this holiday season due to a lack of deployed client-side security measures. Disturbing lack of security measures Tala …

future
Data security and automation top IT projects for 2020, AI not a priority

Data security and automation are the top IT projects for 2020, while artificial intelligence projects are not in the top 10 for IT professionals, according to Netwrix. The …

cloud
Week in review: Public cloud performance, new G Suite security options, how to build a successful SOC?

Here’s an overview of some of last week’s most interesting news, articles and podcasts: Women in cybersecurity can benefit from taking inventory of their personal …

vote
Arlo: An open source post-election auditing tool

The Cybersecurity and Infrastructure Security Agency (CISA) is teaming up with election officials and their private sector partners to develop and pilot an open source …

collaboration
Cyber threats continue to evolve, but security teams remain confident

Coming off of a year of major data breaches making headline news, it’s easy to draw the conclusion that security teams are losing the cybersecurity battle, a DomainTools …

person
Risky behavior exposes consumers to seasonal security scares

In advance of the peak shopping season, a study from PCI Pal shows that millions of Americans continue to over-indulge in risky behaviors – both online and on the phone, …

IoT connection
Create secure IoT products: Enable security by design

Good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime have been introduced …

user
Do third-party users follow security best practices and policies?

Many organizations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security …

tunnel
Driving collaboration between security and IT ops teams is a major challenge

Strained relationships between security and IT ops teams leave businesses vulnerable to disruption, even with increased spending on IT security and management tools, a Tanium …

Don't miss

Cybersecurity news