cybersecurity
How security leaders can build emotionally intelligent cybersecurity teams
How a leader motivates their team, gathers, and uses information, makes decisions, manages change initiatives, and handles crises is referred to as “leadership style”, and is …
Confidence redefined: The cybersecurity industry needs a reboot
I’m sure many of us would like to leave 2020 behind and get back to our “normal” lives but, in some areas, I think that would be a mistake. Despite the challenges and …
Where does the SME fit into a supply chain attack?
“No business is an island, entire of itself” (with apologies to John Donne). Businesses have connections to other businesses, who supply them with goods, and whom they supply …
Trending cybercrimes and the big impact of lesser-known breaches
Sontiq released the Mid-Year 2021 Cybercrime Report, which highlights five key trends and the 2021 data breaches that pose the highest level of risk to victims. Companies are …
Exposing the latest cloud threats affecting enterprises
Netskope revealed new research showing the continued growth of malware delivered by cloud applications and also the potential for critical data exfiltration tied to employees …
Consumers are increasingly concerned about online security and imminent attacks
According to a new Sophos Home survey, forty-five percent of consumers say they’re more at risk of being hit by an attack now than they were before the pandemic, and 61% …
36% of organizations suffered a serious cloud security data leak or a breach in the past year
As cloud adoption accelerates and the scale of cloud environments grows, engineering and security teams say that risks—and the costs of addressing them—are increasing. The …
CISOs operating blind, with limited visibility and control
An overwhelming percentage (75%) of CISOs consider their organization to be at greater risk of a cybersecurity attack due to the transition to home working, with a third …
Consumer attitudes towards various digital identity authentication methods
With concerns around online fraud and identity theft rising, consumers expect businesses to utilize new technologies to protect them online. According to research from …
Verifiable credentials are key to the future of online privacy
To realize the full potential of online services, identity verification solutions are required to avoid fraud and boost trust in the systems, for both end users and …
Ignore API security at your peril
Application programming interfaces (APIs) are at the core of nearly every digital experience – whether that is the delivery of mobile apps that enable consumers to …
The knowledge gap around runtime security and the associated risks
According to Aqua Security’s 2021 Cloud Native Security Practitioner study, only 3% recognize that a container, in and of itself, is not a security boundary, indicating …
Featured news
Resources
Don't miss
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)
- Webinar: Amplifying SIEM with AI-driven NDR for IT/OT convergence
- How CISOs can elevate cybersecurity in boardroom discussions
- A humble proposal: The InfoSec CIA triad should be expanded