Please turn on your JavaScript for this page to function normally.
Trending cybercrimes and the big impact of lesser-known breaches

Sontiq released the Mid-Year 2021 Cybercrime Report, which highlights five key trends and the 2021 data breaches that pose the highest level of risk to victims. Companies are …

glasses
CISOs operating blind, with limited visibility and control

An overwhelming percentage (75%) of CISOs consider their organization to be at greater risk of a cybersecurity attack due to the transition to home working, with a third …

Phishing
40% fell victim to a phishing attack in the past month

The global shift to remote work has exacerbated the onslaught, sophistication, and impact of phishing attacks, according to Ivanti. Nearly three-quarters (74%) of respondents …

Questions that help CISOs and boards have each other’s back

Boards of directors and executives seem increasingly interested in understanding their companies’ security posture. And why wouldn’t they be? The ransomware threat posed by …

security culture
Rebuilding your security culture as employees return to the office

The return to work allows security teams to refocus on areas of their insider risk management program that may have been swept under the rug while working remotely. As …

healthcare
Ensuring HIPAA compliance when using the cloud

Accelerated by the pandemic, health IT has continued to innovate at pace, while having to balance data protection and regulatory rules. However, critical transformations – …

user
It takes more than MFA to beat human hacking

While multi-factor authentication (MFA) is a much-needed addition to an effective cyber defense strategy, it is by no means foolproof. In fact, no single security effort can …

organize
Understanding and stopping 5 popular cybersecurity exploitation techniques

With more than 550,000 new malware samples being discovered every day, closing the security gaps that enable these cyberthreats to access systems should be a priority for …

lock
How can a business ensure the security of their supply chain?

Since the SolarWinds’ supply chain attack, there has been an increased focus on how organizations of all sizes ensure the security of their suppliers. Large and small …

account
Platform or roaming FIDO2 authenticators: Which one is right for your workforce?

One of the main criticisms of any advanced authentication system is usability. In FIDO2 multi-factor authentication (MFA), platform authenticators aim to be the answer to our …

idea
Resilience by design: What security pros need to know about microlearning

It’s no secret that security training is failing us. Research has revealed that more 90% of people struggle to identify a phishing email — arguably one of the most basic …

email
Protecting your organizations against BEC and other email attacks

No matter who you talk to or work with, they probably use email as a primary means of communication. Most of us spend about 5 hours a day checking email, sometimes refreshing …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools