Please turn on your JavaScript for this page to function normally.
Shreekant Thakkar
The role of automation in staying on top of the evolving threat landscape

In this interview with Help Net Security, Dr Shreekant Thakkar, Chief Researcher, Secure Systems Research Centre at TII, talks about the ever evolving threat landscape and how …

Organizations struggling to develop cloud applications that meet security requirements

According to a Security Compass research, in mid-sized to large enterprises, 50% of the software applications being developed are cloud based, and another 30% are expected to …

encryption
Out with the old, in with the new: From VPNs to ZTNA

The VPN held an important role in the evolution of the internet, and for decades has supported businesses in securing their networks. VPNs have been used by businesses and …

White House
The cybersecurity metrics required to make Biden’s Executive Order impactful

For too long, both the private and public sectors have not prioritized cybersecurity efforts enough and only acted in “good faith” – an inadequate effort to improve …

Hands
Why companies should never hack back

After major cyberattacks on the Colonial Pipeline and on meat supplier JBS, the idea of allowing companies to launch cyberattacks back at cyber criminals was proposed. This …

privacy
Consumers value privacy more than potential savings when purchasing insurance

A recent survey by Policygenius explored consumer sentiment toward new tech being deployed by home and auto insurance companies. The survey found that most consumers prefer …

red teaming
How do I select an automated red teaming solution for my business?

Red teaming is an essential part of an organization’s security assessment process. It is generally done manually to uncover possibile vulnerabilities and security gaps, …

container
Security and compliance still a challenge for container architectures

While adoption of container architectures and microservices continues at an impressive pace, maintaining automated and proactive security and compliance is a particularly …

tools
Why automated pentesting won’t fix the cybersecurity skills gap

The modern threat landscape is an enormous challenge for the modern enterprise. Many organizations are “addressing” this by buying the newest security products from the latest …

5G
5G connections to reach 3.2 billion by 2026

The total number of 5G connections will reach 3.2 billion by 2026, rising from 310 million in 2021, a study from Juniper Research has found. To maximise the monetization of …

drown
How building a world class SOC can alleviate security team burnout 

For security leaders, building a mature Security Operations Center is about establishing robust processes that bring teams and technology together for success. Yet many SOC …

Unwanted bot traffic costs businesses $250 million a year

Netacea announced results from a report that reveals the high price that businesses pay because of unwanted bot traffic. According to survey respondents, automated bots …

Don't miss

Cybersecurity news