Please turn on your JavaScript for this page to function normally.
organize
The 5 Ws for building a strong cybersecurity plan

Creating a cybersecurity plan is the first step in starting secure and staying secure. Consider this when planning a budget, getting support from staff, and creating company …

ransomware
Ransomware preparedness is low despite executives’ concerns

86.7% of C-suite and other executives say they expect the number of cyberattacks targeting their organizations to increase over the next 12 months, according to a recent …

lock
Execs concerned about software supply chain security, but not taking action

Venafi announced survey results highlighting the challenges of improving software supply chain security. The survey evaluated the opinions of more than 1,000 IT and …

Kali Linux 2021.3
Kali Linux 2021.3 released: Kali NetHunter on a smartwatch, wider OpenSSL compatibility, new tools, and more!

Offensive Security has released Kali Linux 2021.3, the latest version of its popular open source penetration testing platform. You can download it or upgrade to it. Kali Linux …

hands
Three ways to keep your organization safe from cyberattacks

Cyberattacks continue making headlines as more companies fall victim to ransomware. Throughout the past year, we saw some of the largest breaches, leaks, and real-world …

network
OSI Layer 1: The soft underbelly of cybersecurity

As traditional cybersecurity solutions improve, they push cyberattackers toward alternative paths. Layer 1 of the OSI model (i.e., the physical layer) has become a fertile …

market
IT teams forced into compromising security for business continuity during pandemic

IT teams have been forced into compromising security for business continuity at a time of rising threats, a HP report reveals. Making matters worse, their attempts to increase …

cloud
Only 30% of enterprises use cloud services with E2E encryption for external file sharing

A recent study of enterprise IT security decision makers conducted by Tresorit shows that majority of enterprises use additional encryption methods to boost the security of …

gears
Enterprise automation adoption surging, security and compliance area jump by 171%

Workato unveiled a data report focused on the key trends that shaped automation over the past year. The anonymised data reveals major shifts in automation priorities as …

trend
Network security market growth driven by remote work popularity and security needs

Frost & Sullivan’s recent analysis of the Asia-Pacific (APAC) network security (NWS) market finds that the increasing acceptance of remote work and adoption of …

patch
September 2021 Patch Tuesday forecast: It’s new operating system season

Summer vacations are coming to a close and, for many, the children are finally going back to school providing some quiet time. I hope everyone is well rested because the fall …

zero trust
A zero-trust future: Why cybersecurity should be prioritized for the hybrid working world

The pandemic has had a significant impact on the way we work, and one of our recent research studies found that nearly 65% of companies expect some or all their workforce to …

Don't miss

Cybersecurity news