cybersecurity
PCI Secure Software Standard 1.2 released
PCI Security Standards Council (PCI SSC) published version 1.2 of the PCI Secure Software Standard and its supporting program documentation. The PCI Secure Software Standard …
Leveraging the full potential of zero trust
More than 90% of IT leaders who have started migrating to the cloud have implemented, are implementing, or are planning to implement a zero-trust security architecture, …
Data protection and security in 2023
Change is the only constant. How we think about data protection, rules and regulations, and the changing of organizational structure is evolving. The good news is that …
7 reasons why you must embed trust into the core of your business
As organizational trust becomes a top priority for companies of all sizes and industries, a new OneTrust report highlights seven key industry trends relevant to privacy, …
Fear of cyberattacks drives SMBs to spend more on software
Despite fears of a looming recession, SMBs in the U.S. are spending more on software in 2023, according to Capterra’s 2023 SMB Software Buying Trends Survey. 75% of U.S. SMBs …
Economic uncertainty will greatly impact the spread of cybercrime
Norton released its top cyber trends to watch in 2023, emphasizing that the economy will have the greatest impact on the spread of cybercrime next year. Experts predict the …
Engage your employees with better cybersecurity training
Cybercriminals use a variety of tactics all at once and are constantly innovating. Organizations need to do the same and take a multidimensional approach to cybersecurity …
Top 10 free MITRE ATT&CK tools and resources
MITRE ATT&CK is a knowledge base of adversary tactics and techniques based on real-world observations. ATT&CK is open and available to any person or organization for …
How companies time data leak disclosures
Every year the personal data of millions of people, such as passwords, credit card details, or health details, fall into the hands of unauthorized persons through hacking or …
Cybersecurity engineering under the Federal Trade Commission
When the Federal Trade Commission (FTC) releases new regulations or changes to existing ones, the implications may not be obvious to the average business or company employees. …
Security pros feel threat detection and response workloads have increased
A new report conducted by Enterprise Strategy Group (ESG) highlights why today’s security teams find it increasingly difficult to detect and stop cyber threats targeting their …
How to find hidden data breaches and uncover threats in your supply chain
In this article, we’ll help you: Understand how breaches can stay hidden inside your supply chain Determine if your supplier relationships are increasing your risk Assess your …
Featured news
Resources
Don't miss
- Attackers target retailers’ gift card systems using cloud-only techniques
- Attackers turn trusted OAuth apps into cloud backdoors
- Life, death, and online identity: What happens to your online accounts after death?
- OpenFGA: The open-source engine redefining access control
- For blind people, staying safe online means working around the tools designed to help