Please turn on your JavaScript for this page to function normally.
bomb
Highly Evasive Adaptive Threats (HEAT) bypassing traditional security defenses

Menlo Security announced it has identified a surge in cyberthreats, termed Highly Evasive Adaptive Threats (HEAT), that bypass traditional security defenses. HEAT attacks are …

Group-IB Atmosphere
Product showcase: Group-IB Atmosphere

One of the signs of our time is that businesses integrate cloud email solutions offered by giants such as Google and Microsoft, relying on built-in security systems. In some …

Contextualizing supply chain risks in a SaaS environment

In the wake of the SolarWinds and Kaseya attacks, third-party cybersecurity risks remain top of mind for security leaders. Nonetheless, CISOs continue to experience …

biometrics
MFA still offers the best chance of keeping data secure

Keyavi Data issued a set of best practices for keeping personal and business data out of criminal hands using multi-factor authentication (MFA). These best practices explain …

phishing kits
Phishing kits that bypass MFA protection are growing in popularity

The increased use of multi-factor authentication (MFA) has pushed developers of phishing kits to come up with ways to bypass that added account protection measure. A current …

Aaron Rinehart
Building confidence in your system’s security with chaos engineering

In this interview with Help Net Security, Aaron Rinehart, CTO at Verica, explains the discipline of chaos engineering and how it can help organizations build more resilient …

hunt
How organizations are arming themselves to combat threats

Reblaze announced the results of a Global Surveyz survey of 300 security professionals, to better understand how organizations are approaching web security as we enter a new …

chess
Two initiatives that can move the needle for cybersecurity in 2022

It’s no secret that 2021 was undoubtedly a difficult and stressful year to be a cybersecurity professional. The pandemic-driven remote/hybrid work paradigm and increased …

Cybellum
Product showcase: Cybellum’s Product Security Lifecycle Platform

Automotive, medical device and industrial equipment manufacturers are building critical devices we all rely on – from the cars we use to commute, the equipment that …

lock
Persistent data breaches fueling developer interest in cybersecurity

O’Reilly announced the findings of its annual platform analysis, which examines the top search terms and most-consumed content on the company’s learning platform. Interest in …

connected car
Automotive cybersecurity market size to reach $5.3 billion by 2026

The global automotive cybersecurity market size is projected to grow from $2 billion in 2021 to $5.3 billion by 2026, at a CAGR of 21.3%, according to MarketsandMarkets. …

Group-IB Threat Intelligence & Attribution (TI&A)
Review: Group-IB Threat Intelligence & Attribution (TI&A)

Organizations and enterprises that care about business continuity should have an established security program that needs to be reviewed on a regular basis. One of the hardest …

Don't miss

Cybersecurity news