Please turn on your JavaScript for this page to function normally.
approved
7 reasons why you must embed trust into the core of your business

As organizational trust becomes a top priority for companies of all sizes and industries, a new OneTrust report highlights seven key industry trends relevant to privacy, …

Code
Fear of cyberattacks drives SMBs to spend more on software

Despite fears of a looming recession, SMBs in the U.S. are spending more on software in 2023, according to Capterra’s 2023 SMB Software Buying Trends Survey. 75% of U.S. SMBs …

dark
Economic uncertainty will greatly impact the spread of cybercrime

Norton released its top cyber trends to watch in 2023, emphasizing that the economy will have the greatest impact on the spread of cybercrime next year. Experts predict the …

brain
Engage your employees with better cybersecurity training

Cybercriminals use a variety of tactics all at once and are constantly innovating. Organizations need to do the same and take a multidimensional approach to cybersecurity …

MITRE ATT&CK tools and resources
Top 10 free MITRE ATT&CK tools and resources

MITRE ATT&CK is a knowledge base of adversary tactics and techniques based on real-world observations. ATT&CK is open and available to any person or organization for …

face
How companies time data leak disclosures

Every year the personal data of millions of people, such as passwords, credit card details, or health details, fall into the hands of unauthorized persons through hacking or …

check
Cybersecurity engineering under the Federal Trade Commission

When the Federal Trade Commission (FTC) releases new regulations or changes to existing ones, the implications may not be obvious to the average business or company employees. …

NDR
Security pros feel threat detection and response workloads have increased

A new report conducted by Enterprise Strategy Group (ESG) highlights why today’s security teams find it increasingly difficult to detect and stop cyber threats targeting their …

gap
How to find hidden data breaches and uncover threats in your supply chain

In this article, we’ll help you: Understand how breaches can stay hidden inside your supply chain Determine if your supplier relationships are increasing your risk Assess your …

Europe
EU Council adopts the NIS2 directive

The European Council adopted legislation for a high common level of cybersecurity across the Union, to further improve the resilience and incident response capacities of both …

free cybersecurity resources
7 free cybersecurity resources you need to bookmark

CodeSec CodeSec is a CLI based tool which brings Contrast’s enterprise-level security testing right to your laptop. It allows you to run real-time SAST or Serverless …

dotcom
Many Global 2000 companies lack proper domain security

CSC released its third annual Domain Security Report that found three out of four Forbes Global 2000 companies have not adopted key domain security measures—exposing them to …

Don't miss

Cybersecurity news