cybersecurity
When cybersecurity becomes terrifying
Some cybersecurity horror stories are not your typical horror stories: there’s no danger from a chainsaw-wielding maniac hiding behind a server rack, the Candyman won’t appear …
When it comes to securing systems against quantum computers, there is no one-size-fits-all solution
Quantum computers will rapidly solve complex mathematical problems. This includes the ability to break both RSA and ECC encryption in seconds. In response, NIST has been …
Industrial cybersecurity market to reach $22.3 billion by 2026
The global market for industrial cybersecurity estimated at $15.2 billion in the year 2020, is projected to reach a revised size of $22.3 billion by 2026, growing at a CAGR of …
Eliminate cyber friction with smarter technology
In modern organizations, it’s natural for there to be some friction between cybersecurity teams and employees. While the cybersecurity teams defends the …
DDoS attacks were a more serious threat in Q3 2021 than ever before
Link11 has released new data from its network on the development of the DDoS threat: The number of attacks remains at a very high level in Q3 2021. After Q2 2021 had already …
Dependency Combobulator: Open source toolkit to combat dependency confusion attacks
Apiiro released Dependency Combobulator, a modular and extensible open source toolkit to detect and prevent dependency confusion attacks. The toolkit, available on GitHub, …
Most CIOs and CISOs underestimate the risk of an OT breach
A research study by Skybox Security found that 83% of organizations suffered an operational technology (OT) cybersecurity breach in the prior 36 months. The research also …
Most cybersecurity leaders use microsegmentation to augment corporate network security
In today’s era of remote employees and an ever expanding variety of connected devices, network security is becoming increasingly complex. To compensate, cybersecurity …
Why are we still asking KBA questions to authenticate identity?
Do you remember the name of your second-grade teacher? How about your maternal grandfather’s middle name? If you’ve ever forgotten a password, you’ve no doubt experienced the …
API sprawl: A threat you might want to address later, but you can’t ignore it
F5 announced a report which analyzes the serious threat to business and the economy posed by the global proliferation of APIs. When APIs gained widespread adoption in the …
EU Commission takes on challenge to improve the cybersecurity of wireless devices
The European Commission has taken action to improve the cybersecurity of wireless devices available on the European market. As mobile phones, smart watches, fitness trackers …
Retail industry security incidents soaring, worsened by the supply chain crisis
Imperva’s 12-month analysis on cybersecurity risks in the retail industry suggests that the 2021 holiday shopping season will be further disrupted by cybercriminals …
Featured news
Resources
Don't miss
- Rsync vulnerabilities allow remote code execution on servers, patch quickly!
- Contextal Platform: Open-source threat detection and intelligence
- Using cognitive diversity for stronger, smarter cyber defense
- Microsoft fixes actively exploited Windows Hyper-V zero-day flaws
- Fortinet fixes FortiOS zero-day exploited by attackers for months (CVE-2024-55591)