Please turn on your JavaScript for this page to function normally.
businessman
CISO do’s and don’ts for board reporting

Security is no longer just a job for IT – it impacts all areas of a business, from brand perception to the bottom line. As a result, CISOs are increasingly being asked to …

healthcare professionals
Healthcare executives need to make cybersecurity a business priority

Risks associated with Internet of Things, medical devices, third-party vendors, and program management are top of mind for healthcare executives, according to a CynergisTek’s …

encryption
Code signing keys and certificates are crucial security assets, are you protecting them?

Only 28 percent of organizations consistently enforce a defined security process for code signing certificates, a Venafi study of over 320 security professionals in the U.S., …

globe
Personal security and national security concerns are back on the rise

More than one in five (22%) Americans say they have cancelled plans or considered cancelling plans to attend large-scale public events due to concerns about physical attacks …

US Army
First framework to score the agility of cyber attackers and defenders

To help train government and industry organizations on how to prevent cyberattacks, as part of a research project for the U.S. Army, scientists at The University of Texas at …

email
3.4 billion fake emails are sent around the world every day

At least 3.4 billion fake emails are sent around the world every day — with most industries remaining vulnerable to spear-phishing and “spoofing” cyberattacks simply because …

bulb
Hackproofing smart meters and boosting smart grid security

Smart electricity meters are useful because they allow energy utilities to efficiently track energy use and allocate energy production. But because they’re connected to …

Think
How human bias impacts cybersecurity decision making

The human brain is a fantastic machine, but we’re all subject to cognitive bias and reasoning errors – and cybersecurity pros are no exception. In a newly released …

icosahedral
Is there a weak link in blockchain security?

Recent research revealed that blockchain is set to become ubiquitous by 2025, entering mainstream business and underpinning supply chains worldwide. This technology is set to …

DevSecOps
There’s a significant disconnect between DevOps capabilities and DevSecOps readiness

Retailers are putting their customer’s data at risk by failing to incorporate proper security controls in their new application development practices, according to the latest …

snake
Criminals are selling hacking services targeting world’s biggest companies

A new study – undertaken by Dr. Mike McGuire, Senior Lecturer in Criminology at the University of Surrey, and underwritten by Bromium – provides details of first-hand …

DDoS
Global communications service providers struggling to fend off growing number of DDoS attacks

Global communications service providers, whose businesses are predicated on continuous availability and reliable service levels, are struggling to fend off a growing number of …

Don't miss

Cybersecurity news