Please turn on your JavaScript for this page to function normally.
Businessman
Most SMBs are not worried about their business being hacked

America’s small business owners may want to consider placing a greater emphasis on cyber awareness and best practices year-round. According to a new survey by Paychex, …

cloud
Third-party risk management: Moving toward centralized, automated systems

While concerns about third-party risk remain high – particularly regarding cyber security – 58% of organizations ranked their programs as maturing or advanced, according to …

email
CEO email exposure underscores the importance of password management

Nearly one in three major CEOs has been pwned using their company email address, according to a new F-Secure study. In other words, a service they access using their company …

hand
Lending industry faces higher fraud costs than e-commerce, retail and financial services

Lenders face higher costs of fraud than other industries, including retail, e-commerce and financial services. For every dollar of fraud, lending companies incur $2.82 in …

quantum
The race to quantum supremacy and its cybersecurity impact

Quantum computing uses the power of atoms to perform memory and processing tasks and remains a theoretical concept. However, it is widely believed that its creation is …

laptop
Secure remote browsing: A different approach to thwart ever-changing threats

A defense-in-depth strategy is essential to modern enterprises, and organizations must deepen their defenses as quickly as possible to fully protect themselves. One promising …

industry
Data-driven analysis of vulnerabilities in real-world OT networks

Operational Technology (OT) networks are ripe targets for adversaries, whose motives range from criminal intent to operational disruption and even threats to human and …

cloud
Cloud security today: Complexity, compliance, and containerization

An new report by Threat Stack and ESG sheds light on the security and business challenges that accompany the growth of public cloud environments and containers. Overall, the …

virtual reality
Immersive technologies are game changers for cybersecurity job growth

A new ESG study, which surveyed more than 500 people aged 16 to 24, revealed that 74% of respondents said the use of VR tools would increase their likelihood of pursuing …

access
The 10 misconceptions of using a policy-based approach for access control

The principle of Attribute Based Access Control (ABAC) has existed for many years. It’s the evolution from simple access control lists and role-based access control, to a …

analyst
Infosec shouldn’t eat their own, we’re better than this

Security teams the world around are putting in hours every day to keep their company’s most prized assets secure. These are professionals that have spent considerable time …

hand
Cybercriminals focus on the shipping and cloud storage sectors

The Anti-Phishing Working Group’s latest report found upticks in phishing attacks against companies in the Logistics & Shipping as well Cloud Storage & File …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools