cybersecurity
Unused identities: A growing security threat
In early May 2021, Colonial Pipeline, the operator of the pipeline that pumps 45% of the East Coast’s fuel, announced that they had been hacked. In his testimony before the …
How worried should organizations be about their phishing click rate?
Overall end user click rates remained high in the face of this year’s phishing simulation, a Terranova Security report reveals. It also details the rise in the number of …
December 2021 Patch Tuesday forecast: How do you stack up?
I can’t believe that the end of 2021 is already in sight, and looking backwards, I have to say we’ve had our share of interesting events. If I had to characterize it from a …
Extracting value from the interconnected network of risk management
From the CISO to the SOC operator, defenders struggle to maintain complete situational awareness. Holistic approaches to risk management require the implementation of a …
What cybersecurity trends do company executives expect to see next year?
Query.AI announced the publication of the company’s six predictions for the cybersecurity industry in 2022. “The most obvious factor influencing what we’ll …
2021 will be a record-breaking year for data breaches, what about 2022?
In a new Experian forecast, five predictions for 2022 underscore the ongoing impact of the pandemic on cybersecurity. Cybercriminals will continue to exploit vulnerabilities …
The current state of zero trust: Awareness is high, adoption is lagging
One Identity released global survey findings that unpack the current state of zero trust awareness and adoption across the enterprise. As zero trust awareness continues to …
Healthcare cybersecurity market size to reach $35.5 billion by 2027
The healthcare cybersecurity market size is anticipated to record a valuation of $35.5 billion by 2027, according to the most recent study by Global Market Insights. …
Adapting higher education to address the cybersecurity skills shortage
In this Help Net Security interview, Dr. Jason R.C. Nurse, Associate Professor in Cyber Security in the School of Computing and the Institute of Cyber Security for Society …
CIS Benchmarks communities: Where configurations meet consensus
Have you ever wondered how technology hardening guidelines are developed? Some are determined by a particular vendor or driven by a bottom-line perspective. That’s not the …
Kafdrop flaw allows data from Kafka clusters to be exposed Internet-wide
Researchers at Spectral discovered a security flaw in Kafdrop, a popular open-source UI and management interface for Apache Kafka clusters that has been downloaded more than …
Making robotics security a top priority
Competition in the industrial robotics market is heating up, with worldwide investment expected to reach $210 billion by 2025 – more than double the amount in 2020. …
Featured news
Resources
Don't miss
- UK’s new Cyber Security and Resilience Bill targets weak links in critical services
- Patch Tuesday: Microsoft fixes actively exploited Windows kernel vulnerability (CVE-2025-62215)
- When every day is threat assessment day
- Autonomous AI could challenge how we define criminal behavior
- ProxyBridge: Open-source proxy routing for Windows applications