Please turn on your JavaScript for this page to function normally.
collaboration
The risks associated with the influx of unauthorized collaboration tools

A majority (82 percent) of end-users are pushing back on IT or management when the company tries to dictate which collaboration tools should be used. But IT is standing its …

(IN)SECURE Magazine issue 61
(IN)SECURE Magazine issue 61 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 61 has been released today. Table of contents How …

analyze
CISO’s guide to an effective post-incident board report

A successful cyberattack is undoubtedly one of the most disruptive events an organization can experience. Whether it’s phishing, DDoS, ransomware or SQL injection, the …

Symantec ISTR
Formjacking is the new get rich quick scheme for cybercriminals

Faced with diminishing returns from ransomware and cryptojacking, cybercriminals are doubling down on alternative methods, such as formjacking, to make money according to …

shadow
Prevent shadow IT: Companies need security covering multiple communication vectors

There is a critical need for companies to adopt comprehensive and secure enterprise communications platforms to prevent shadow IT. It is a phenomenon where employees, to …

touchscreen
Global mobile networks to support 12.3 billion devices and IoT connections by 2022

There has been a worldwide rise in mobile access for consumers and business users. The expanded reach and quality of mobile broadband has fostered a seemingly insatiable …

Ryuk
Ryuk: What does the helpdesk tell us?

Cybercrime is the only criminal channel that provides a helpdesk. An amusing side note in the world of digital crime, and whilst considerable efforts have been taken to …

thief
Insights on modern adversaries and their tactics, techniques, and procedures

In today’s ever-evolving cyber landscape, speed is essential for effective cyber defense. CrowdStrike’s Global Threat Report reveals “breakout time” – the critical window …

IoT
European standards org releases consumer IoT cybersecurity standard

The European Telecommunications Standards Institute (ETSI) has released ETSI TS 103 645, a standard for cybersecurity in the Internet of Things, to establish a security …

success
Free decryption tool could save victims millions in ransomware payments

A new decryption tool has been released for free on the No More Ransom depository for the latest strand of GandCrab. This tool was developed by the Romanian Police in close …

secure
Webinar: Defending account takeovers at Remitly

Account Takeover attacks don’t follow conventional attack patterns – they look, act, and feel like legitimate users. Without the right tooling, visibility into …

NGINX
Building security into cloud native apps with NGINX

Companies like Airbnb, Uber and DoorDash, which have a cloud-based software infrastructure as one of their main enablers, are disrupting the hospitality, transportation and …

Don't miss

Cybersecurity news