Please turn on your JavaScript for this page to function normally.
bot
How can attackers abuse artificial intelligence?

Artificial intelligence (AI) is rapidly finding applications in nearly every walk of life. Self-driving cars, social media networks, cybersecurity companies, and everything in …

hunt
The rise of digital platforms is empowering the military, but challenges remain

Digital technologies such as cloud computing, big data, data analytics, IoT, artificial intelligence, augmented reality, and blockchain are gradually being leveraged in the …

tools
Do you have what it takes to be a hardware hacker?

If you ask Yago Hansen, a hacker specialized in Wi-Fi and RF security, curiosity and a willingness to learn and improve your skills are the two things that you absolutely must …

money
Organizations expect to boost their cybersecurity investments by 34%

Annual losses from cyberattacks averaged $4.7 million in the last fiscal year — with more than one in 10 firms losing over $10 million —according to a new report from ESI …

complex
Multi-stage attack techniques are making network defense difficult

IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up to date technology, …

healthcare
How well are healthcare organizations protecting patient information?

Healthcare organizations have high levels of confidence in their cybersecurity preparedness despite most of them using only basic user authentication methods in the face of an …

First
CVSS 3.1: Refined and updated for easier adoption by the security community

The Forum of Incident Response and Security Teams (FIRST) has published an update of its internationally recognized Common Vulnerability Scoring System (CVSS). CVSS is a …

cloud
How businesses can become more nimble and secure by moving to the cloud

Today’s business landscape is more dynamic than ever before. Organizations are being inundated with data, generated by an ever-increasing number of connected devices and …

Door
Small and mid-sized organizations remain especially vulnerable to persistent compromises

Despite sophisticated prevention security tools, small to mid-sized organizations continue to be especially vulnerable to long lasting breaches due to their inability to …

Hand
Insights into end-user security awareness and behavior around phishing

Phishing remains a leading concern for organizations worldwide. A new Proofpoint report features analysis of data related to nearly 130 million cybersecurity questions and …

lightbulb
69% of organizations believe they can’t respond to critical threats without AI

Businesses are increasing the pace of investment in AI systems to defend against the next generation of cyberattacks, a study from the Capgemini Research Institute has found. …

vault
The highly competitive global encryption management solutions market continues to grow

The increasing adoption of digitalization and globalization of enterprises have made IT resources prone to cyber attacks. This has increased the demand for encryption …

Don't miss

Cybersecurity news