cybersecurity
Product showcase: ESET Cybersecurity Awareness Training
Engaging training scenarios, plus robust phishing simulation and reporting capabilities ESET is a market-leading cybersecurity provider, offering a comprehensive security …
Dealing with security vulnerabilities on data center servers requires more skilled staff
There is a lot of attention being paid to continuously updating servers to patch security vulnerabilities on Linux servers running in data centers – a basic step …
54% of businesses now have a policy in place to deal with ransomware attacks
54% of businesses now have a defined policy in place to deal with ransomware attacks – whether this means paying a ransom, relying on insurance policies or refusing to pay at …
What drives SDN adoption?
U.S. enterprises are looking to software-defined networking (SDN) providers to help them increase their agility and flexibility and enable remote working after the COVID-19 …
It takes more than MFA to beat human hacking
While multi-factor authentication (MFA) is a much-needed addition to an effective cyber defense strategy, it is by no means foolproof. In fact, no single security effort can …
How Microsoft is taking cloud-powered innovation beyond Earth with Azure Space
The space community is growing rapidly and Microsoft’s Space team is developing capabilities and services to meet its needs for extended connectivity across the world, …
Addressing the cybersecurity skills gap: Where do we go from here?
There are an estimated 3.12 million cybersecurity jobs that need to be filled – more than double the current number of workers in this field. With this drastic gap, it is …
A more dynamic approach is needed to tackle today’s evolving cybersecurity threats
For decades, the cybersecurity industry has followed a defense-in-depth strategy, which allowed organizations to designate the battlefield against bad actors at their edge …
What is the cost of an insider data breach?
As companies emerge from the pandemic, and 40% of employees are planning to switch jobs, corporate data is at risk. Files are being uploaded, shared, synced and emailed by …
1 in 5 companies fail PCI compliance assessments of their infrastructure
According to a recent poll by SentryBay, the infrastructure of over 21% of surveyed companies has failed key PCI compliance assessments, designed to assist them to maintain …
Understanding and stopping 5 popular cybersecurity exploitation techniques
With more than 550,000 new malware samples being discovered every day, closing the security gaps that enable these cyberthreats to access systems should be a priority for …
Paving the way for women in industrial cybersecurity research
The professional journey an individual takes is heavily influenced by the people they are surrounded with throughout their life. From an early age, I knew I wanted to study …
Featured news
Resources
Don't miss
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)
- Webinar: Amplifying SIEM with AI-driven NDR for IT/OT convergence
- How CISOs can elevate cybersecurity in boardroom discussions
- A humble proposal: The InfoSec CIA triad should be expanded