>>> BLACK FRIDAY 2025 cybersecurity deals to explore <<<

Please turn on your JavaScript for this page to function normally.
Sun Tzu 2.0: Is cyberwar the new warfare?

For better or worse, the multitude of networks that help keep our world interconnected is a much different place today than it was in the past. Paradoxically, the networks …

Can organizations hold back the tide of cloud adoption?

For many organisations holding back the tide of cloud-based services adoption is almost impossible as the use cases are overwhelming, according to a new report by analyst firm …

How complex attacks drive the IT security innovation race

There’s a need for organizations to reduce time to detection (TTD) in order to remediate against sophisticated attacks by highly motivated threat actors, according to …

New Google Drive phishing campaign exposed

Elastica discovered a new Google Drive-based advanced phishing campaign initiated by unknown attackers. The attackers used JavaScript code obfuscation and compromised websites …

Automated threat management: No signature required

The industry approach to detecting threats is inherently reactive, ceding the first-mover advantage to the cyber criminals. Defenses – based on signatures, reputation lists …

Internet of Things: Bracing for the data flood

There’s a real opportunity now to incorporate the scaling and management (including security management) needs for the IoT in the way we plan our enterprise and consumer …

Edward Snowden to discuss privacy at IP EXPO Europe 2015

Edward Snowden will deliver a keynote at IP EXPO Europe 2015, taking place at London’s ExCel. Joining the event live via satellite on Wednesday 7th October, Snowden will share …

Most employees don’t understand the value of data

New research from Fujitsu has revealed that only 7% of employees rate their business data higher than their personal information. The results highlight how employees don’t …

Three steps to a successful cloud migration

People are hoarders by nature. Year after year, we accumulate new things – some that we need, and some that we will never touch again after one use. This stockpile adds up, …

A data security guy’s musings on the OPM data breach train wreck

Despite all the media attention to breaches, there is still way too much apathy when it comes to data-centric security. Given the sensitive data the OPM was tasked with …

Week in review: Tools for detecting Hacking Team spyware, vulnerable Smart Home Hubs, and the most sophisticated Android malware ever exposed

Week in review: Tools for detecting Hacking Team spyware, vulnerable Smart Home Hubs, and the most sophisticated Android malware ever exposedHere’s an overview of some …

Security flaws discovered in popular Smart Home Hubs

Smart Home Hubs are used to control lighting, heating, locks and cameras in people’s homes. Unsurprisingly, many security experts worry about the privacy and safety risks …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools