Please turn on your JavaScript for this page to function normally.
XDR
Three signs your SOC is ready for XDR

Over the past year, there’s been a movement growing in the industry towards Extended Detection and Response, or XDR. While a few offerings represent broad portfolio …

CFAA
What’s at stake in the Computer Fraud and Abuse Act (CFAA)

Two weeks ago, the Supreme Court heard oral arguments in Van Buren vs. United States, the landmark case over the Computer Fraud and Abuse Act (CFAA). Nathan Van Buren, the …

vulnerability
Third-party online assets a growing security risk for retailers

83% of the top U.S. retailers have connections to a vulnerable third-party asset, and 43% have vulnerabilities that pose an immediate cybersecurity risk, Cyberpion reveals. In …

healthcare
How COVID-19 has impacted the security threat landscape

A WatchGuard report reveals how COVID-19 has impacted the security threat landscape, with evidence that attackers continue to target corporate networks despite the shift to …

cloud complexity
Remote and cloud-based systems to be ruthlessly targeted next year

Home networks, remote working software and cloud systems will be at the center of a new wave of attacks in 2021, Trend Micro predicts. Cybercriminals in 2021 will particularly …

CPRA
CPRA hints at the future of cybersecurity and privacy

One of the most notable ballot propositions impacting the privacy and cybersecurity world during the US 2020 election was the passage of the California Privacy Rights Act …

build
2021 predictions: The rise of cyber resilience

Each year seems to come with more cyber threats, “bad actors,” ransomware and data breaches. The security industry is on fire right now with technology providers continuing to …

COVID-19
40% of COVID-19 contact tracing apps lack basic protections

Guardsquare announced the release of a report which reassesses the levels of security protections and privacy risks of COVID-19 contact tracing apps. The report found that of …

Joerg Appenzeller computer chip
Engineers design transistor that disguises key computer chip hardware from hackers

A hacker can reproduce a circuit on a chip by discovering what key transistors are doing in a circuit – but not if the transistor “type” is undetectable. Purdue University …

road sign
Most IT decision makers don’t trust data, but 54% still use it to make decisions

77% of IT decision makers (ITDMs) don’t completely trust the data within their organization for timely and accurate decision making, according to SnapLogic. With 98% of those …

cyber insurance
How do I select cyber insurance for my business?

There has been a 70%+ increase in the average cost of a cybercrime to an organization over five years to $13mn and a 60%+ increase in the average number of security breaches, …

shark
2020 to reach vulnerability disclosure levels similar to those in 2019

The number of vulnerability disclosures is back on track to reach or bypass 2019 as we head into 2021, according to Risk Based Security. The team aggregated 17,129 …

Don't miss

Cybersecurity news