Please turn on your JavaScript for this page to function normally.
bomb
Most CIOs and CISOs underestimate the risk of an OT breach

A research study by Skybox Security found that 83% of organizations suffered an operational technology (OT) cybersecurity breach in the prior 36 months. The research also …

data
Most cybersecurity leaders use microsegmentation to augment corporate network security

In today’s era of remote employees and an ever expanding variety of connected devices, network security is becoming increasingly complex. To compensate, cybersecurity …

Why are we still asking KBA questions to authenticate identity?

Do you remember the name of your second-grade teacher? How about your maternal grandfather’s middle name? If you’ve ever forgotten a password, you’ve no doubt experienced the …

skull binary
API sprawl: A threat you might want to address later, but you can’t ignore it

F5 announced a report which analyzes the serious threat to business and the economy posed by the global proliferation of APIs. When APIs gained widespread adoption in the …

EU
EU Commission takes on challenge to improve the cybersecurity of wireless devices

The European Commission has taken action to improve the cybersecurity of wireless devices available on the European market. As mobile phones, smart watches, fitness trackers …

ecommerce
Retail industry security incidents soaring, worsened by the supply chain crisis

Imperva’s 12-month analysis on cybersecurity risks in the retail industry suggests that the 2021 holiday shopping season will be further disrupted by cybercriminals …

patch
November 2021 Patch Tuesday forecast: More mandates in the United States

The global holiday season is upon us with Diwali happening now, Thanksgiving the end of the month, and then on to Christmas and New Years! But before we all start celebrating, …

SIEM
Why integrating SIEM tools is crucial to managing threats

Maintaining cybersecurity for organizations has never been more complex; now that remote and hybrid work has become the norm, access to a company’s network is no longer …

industrial
Unseen gatekeepers: Industrial software providers’ role securing global infrastructure

National infrastructure in almost every Western country has come under attack by threat actors in the last few years. These attacks have grabbed the attention of businesses, …

fix
Software development: Why security and constant vigilance are everyone’s responsibilities

An report from May 2021 has found that 81% of developers admit to knowingly releasing vulnerable apps, and 76% experienced pressure to sacrifice mobile security for …

communication
Lean security: How small cybersecurity teams perform at Fortune 2000 levels

There’s a widespread misconception that small IT security teams, or “lean sec teams”, cannot protect their organizations as comprehensively as bigger security teams who enjoy …

lock
How to ease password pains while maintaining security

As much as any industry, healthcare must deal with a security landscape that is fraught with challenges and tensions. Health delivery organizations (HDOs) operate under …

Don't miss

Cybersecurity news