Please turn on your JavaScript for this page to function normally.
open source
OpenChain Project: Best practices for an ecosystem of open source software compliance

Yesterday at LinuxCon in Berlin, The Linux Foundation announced that the OpenChain Project has established its first set of requirements and best practices for consistent free …

Cloud
Cloud providers not expanding security as fast as customers adopt cloud

Information security professionals trust the cloud even less now than they did last year, despite efforts by cloud-service providers to tighten security, according to the SANS …

Big Data
Using Big Data for intelligent enterprise security

No industry remains untouched by the potential of Big Data – and the cybersecurity sector is certainly no exception. A recent MarketsandMarkets study predicted the …

Polyglot ransomware decryption tool released

Kaspersky Lab experts have released a Polyglot ransomware decryption tool, which enables users who have suffered from this ransomware, also known as MarsJoke, to restore their …

virtual reality
Augmented Reality market to experience explosive growth

The Augmented Reality market size at $659.7 million in 2015 is anticipated to reach $80.8 billion by 2022, according to ReportsnReports. The AR market goes from $659.7 million …

New York State
Proposed cyber security requirements for New York State seem to be more of the same

This month, New York State Governor Andrew Cuomo announced proposed regulation that requires banks, insurance companies, and other financial services institutions regulated by …

business
Security startup confessions: Hiring and firing

My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

nmap
Nmap 7.30: New NSE scripts, Npcap, fingerprints

Nmap 7.30 is the first stable release since 7.12 back in March. Apart from bug fixes, it comes with new features, including more NSE scripts, an improved version of Npcap …

abstract
Digital disruptors demand a new approach to IT

Digital disruptors such as algorithms, artificial intelligence (AI), bots and chatbots are already transforming businesses. Gartner expects that algorithmic business will …

IEEE 802.3bz standard brings 2.5 and 5 Gb/s to existing cabling

The Ethernet Alliance hailed ratification of IEEE 802.3bz, Standard for Ethernet Amendment: Media Access Control Parameters, Physical Layers and Management Parameters for 2.5 …

world in hand
Week in review: Securing ICS, and the reasons behind risky password practices

Here’s an overview of some of last week’s most interesting news and articles: Yahoo breach was not state-sponsored, researchers claim The massive 2014 Yahoo breach …

email
Clear and present danger: Combating the email threat landscape

Like it or loathe it, email is here to stay. Despite the ubiquity of file sharing services like OneDrive and Google Docs, email remains a fast and convenient way for users to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools