Please turn on your JavaScript for this page to function normally.
data
When done right, network segmentation brings rewards

96% of organizations claim to be implementing segmentation in their networks, yet only 2% of those organizations are segmenting all six mission-critical asset classes, …

keyboard
Security priorities are geared toward ongoing remote and hybrid work

Nearly two years into the pandemic, SME IT admins report they’re considered an important voice in company operations and fewer are feeling overwhelmed despite facing continued …

5G
Adoption of private 5G networks accelerates, as organizations look to improve security and speed

There’s a significant interest in private 5G networks, with 90% of executives expecting that private 5G will become the standard network choice, according to an …

Crystal Eye XDR
Product showcase: Is Crystal Eye XDR the most comprehensive security platform on the market?

In this product showcase, we look at Red Piranha’s Crystal Eye XDR platform. Red Piranha pioneered the integrated security service model back in 2015 with out of the box MDR …

passwordless
Passwordless verification API transforms every mobile phone into a security token for zero trust access

What is small, tamper-proof, cryptographically secure, and already used by 6.37 billion people? The SIM card. We carry this compact piece of secure tech everywhere without …

cloud
Foundational cloud security with CIS Benchmarks

Cloud service providers (CSPs) have changed the way organizations of all sizes architect and deploy their IT environments. CSPs now make it possible for organizations to …

Laura Hoffner
Modern cars: A growing bundle of security vulnerabilities

In this interview with Help Net Security, Laura Hoffner, Chief of Staff at Concentric, talks about modern car vulnerabilities, the techniques hackers are using to compromise …

mobile devices
Employees think they’re safe from cyberthreats on company devices

A research launched by Menlo Security reveals increased cybersecurity risks posed to employees and organizations during the 2021 holiday shopping season. The research – which …

business
Execs upping the ante on technology investment for 2022, acquiring talent a major focus

In perhaps a positive outlook for the economy, business leaders are doubling down on technology investment for 2022. However, they have significant concerns regarding …

ransomware
How C-suite executives perceive their organizations’ readiness for ransomware attacks

A new (ISC)² study provides insights for cybersecurity professionals into the minds of C-suite executives and how they perceive their organisations’ readiness for ransomware …

user
Unused identities: A growing security threat

In early May 2021, Colonial Pipeline, the operator of the pipeline that pumps 45% of the East Coast’s fuel, announced that they had been hacked. In his testimony before the …

phishing
How worried should organizations be about their phishing click rate?

Overall end user click rates remained high in the face of this year’s phishing simulation, a Terranova Security report reveals. It also details the rise in the number of …

Don't miss

Cybersecurity news