Please turn on your JavaScript for this page to function normally.
Red door
Unrestricted access to systems and files exposes organizations to cybercrime

UK organisations are leaving themselves vulnerable to cybercrime with over a third of 18-24-year-olds able to access any files on their company network, and only one in five …

architecture
Threat modeling: What’s all the buzz about?

Keen observers will have noted an uptick in activity around threat modeling within the information security community recently with new tools being released and strategies and …

gap
Could an Equifax-sized data breach happen again?

Many global financial services organizations are targeted by sophisticated cyberattackers in an attempt to steal critical data and personally-identifiable information (PII), …

laptop
Endpoint security automation a top priority for IT pros

A new SANS Institute report found that automating endpoint detection and response processes is the top priority for IT professionals trying to put actionable controls around …

trend
Major trends in app development, agile/DevOps maturity, and low-code adoption

Digital transformation dominates business strategy today, which is why web and mobile development demand is booming. Moreover, speed and agility are more important than ever …

future
Disruptive technologies in fintech to watch

Juniper Research has revealed the top 10 technologies set to disrupt the fintech industry in 2018 and 2019. New research found a wealth of positive changes stemming from …

Idea
Execs don’t believe their companies learn the right lessons in cybersecurity

A majority of executives around the world feel their organizations can do better when it comes to learning from their past cyber mistakes, according to the results of a newly …

insider threat
Employee negligence still poses major security concerns

With one-third of working adults in the U.S. admitting to potentially risky behavior at work, employee negligence poses major security concerns for U.S. businesses, according …

Google Firebase
3,000+ mobile apps leaking data from unsecured Firebase databases

Appthority published research on its discovery of a new HospitalGown threat variant that occurs when app developers fail to require authentication to Google Firebase …

reload
Visibility across the digital experience is critical to manage it successfully

Riverbed found that 99% of business decision makers agree that optimizing digital performance is essential to business performance, and 98% agree that digital, including the …

World map
CyberMap: Live map of Israel’s cybersecurity ecosystem

During CyberWeek 2018, YL Ventures launched CyberMap, the first live map of Israel’s cybersecurity ecosystem. The live landscape enables interactive filtering based on: …

person
Early detection of compromised credentials can greatly reduce impact of attacks

According to Blueliv’s credential detection data, since the start of 2018 there has been a 39% increase in the number of compromised credentials detected from Europe and …

Don't miss

Cybersecurity news