Please turn on your JavaScript for this page to function normally.
attacks
Attackers rapidly adopting new techniques to target users

Zix announced the release of a report which finds attackers are rapidly adopting new techniques to target users. “Cybercrime is exploding in 2021 and if there is anything that …

identity theft
The warning signs of burnout and how to deal with it

It’s easy for information security professionals to feel burnt out. From the constant stream of security alerts to the demands of senior management, it can be tempting …

zero
Zero trust network access: A safe journey to a better employee experience

Trust is a foundational element of society. When engaging in any social or commercial interaction, we need to be able to trust the people we deal with. And yet, one of …

Phishing
Phishing attacks increase in H1 2021, sharp jump in crypto attacks

Overall, the first half of 2021 shows a 22 percent increase in the volume of phishing attacks over the same time period last year, PhishLabs reveals. Notably, however, …

Work
As hybrid working arrangements remain, employers must ensure their staff works safely

Working from home has significantly increased cybersecurity vulnerabilities over the past two years, according to the world’s leading enforcement agencies. Employers must …

vault
Enterprises looking to cybersecurity providers to help protect IT systems

As enterprises in Germany digitize their operations and deal with the ongoing effects of the COVID-19 pandemic, they are looking to cybersecurity service providers to help …

lock
Electronic security market to reach $80 billion by 2027

The electronic security market size is anticipated to record a valuation of $80 billion by 2027, according to a study by Global Market Insights. The global market is poised to …

T-Mobile
T-Mobile data breach: New information uncovered by the investigation

In the wake of the recent claims that T-Mobile U.S. has suffered a massive data breach and the consequent industry reactions, the company has shared additional information its …

cloud complexity
The 3 Rs of visibility for any cloud journey

Dealing with an incident requires not just prompt notification of the incident, but the ability to triage the cause of the incident, the ability to carry out forensics, …

critical infrastructure
Collaboration is the key to protecting critical national infrastructure

Concern around protecting critical national infrastructure (CNI) is growing. Following several high-profile attacks and growing tensions around state sponsored cyber activity, …

lock
Cybersecurity is top priority for enterprises as they shift to digital-first operating models

90% of enterprises are yet to achieve their digital-first goals with 49% admitting that cybersecurity is the top most priority for their business, a Tata Communications report …

person
How businesses use data might not be popular with the public

A KPMG survey reveals a deep disconnect between corporate data practices and the general population’s expectations around transparency and data privacy. As companies collect …

Don't miss

Cybersecurity news