Please turn on your JavaScript for this page to function normally.
employee
Organization face security risks due to lack of skilled cyber security experts

According to a study conducted by Dimensional Research among 500 IT security professionals, only twenty-five percent were confident their organizations have the number of …

defend
IoT security: Defending a young industry from attack

As the IoT industry matures, it’s safe to say we’re well past “early adopter” phase and seeing broader development and deployment. While the prospect of a more established and …

arrows
Hackers changing tactics, techniques and procedures

Organizations need to conduct better penetration testing to combat continual changes in hackers’ tactics, techniques and procedures (TTPs), according to NTT Security. “Our Q3 …

SaaS
SMB security: The evolving role of SaaS and IT outsourcing

SMBs need to bridge the gap between smaller IT security budgets and a shortage of expertise to face the very real and growing threat of cyber attacks, according to Kaspersky …

Study Guide 70-410
Study Guide: Installing and Configuring Windows Server 2012

This Study Guide covers Microsoft’s 70-410 “Installing and Configuring Windows Server 2012” exam. It’s the first exam of three exams that make up the …

watch
Top 10 strategic predictions for IT organizations and users

Gartner revealed its top predictions for 2017 and beyond, which examine three fundamental effects of continued digital innovation: experience and engagement, business …

abstract, generic
Week in review: DNS DDoS, Linux kernel zero-day, VeraCrypt audited

Here’s an overview of some of last week’s most interesting news, reviews and articles: Dirty COW Linux kernel zero-day exploited in the wild is now patched Linux …

3d printing
Hacking 3D manufacturing systems demonstrated by researchers

Researchers from three universities combined their expertise to demonstrate the first complete sabotage attack on a 3D additive manufacturing (AM) system, illustrating how a …

deep web
How cybercriminals attack homes, and how to stop them

At a recent Home Hacker Lab event, an ethical hacker revealed how cybercriminals attack, and what consumers can do to protect themselves. The October 13 workshop in New York …

EU flag
Low GDPR preparedness represents revenue threat

96 percent of companies still do not fully understand the European General Data Protection Regulation (GDPR), despite it coming into effect in May 2018. Elements respondents …

Market
Encryption software market to reach $8.94 billion by 2021

The ecryption software market size is estimated to grow from $3.05 billion in 2016 to $8.94 billion by 2021, at an estimated CAGR of 24.0%, according to MarketsandMarkets. …

Skype call
Typing while Skyping could leave you vulnerable to eavesdropping

If you type on your desktop or laptop computer’s keyboard while participating in a Skype call, you could be vulnerable to electronic eavesdropping, according to researchers at …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools