Please turn on your JavaScript for this page to function normally.
storm
How can IoT stakeholders mitigate the risk of life-threatening cyberattacks?

With an estimated 20 billion Internet-connected devices set to appear in our homes and offices by the end of the decade, future cyberattacks will dwarf what we’ve seen …

One
Cyber attacks becoming No. 1 business risk

SonicWall recorded 9.32 billion malware attacks in 2017 and saw more than 12,500 new Common Vulnerabilities and Exposures (CVE) reported for the year. “The cyber arms race …

earth
Global security trends for 2018: GDPR, identity and access security

In its third annual global IT security survey, Versasec found Europe’s General Data Protection Regulation (GDPR) is impacting security planning around the world, smart …

key
Vermeer’s Camera: Uncovering the link between art criticism and cybersecurity

My mother is a lacemaker; thus, her attachment to the Vermeer painting of that name. It’s in the Louvre. If you only know it from reproductions, it’s smaller than …

laptop
How to choose a penetration testing service

Penetration testing or pen testing for short is a simulation of an attack on your company’s IT infrastructure or specific assets in order to assess the security posture …

iPhone business
How to improve your security infrastructure when you’re on a budget

When you’re on a tight budget for cybersecurity, it can seem almost impossible to secure every part of your businesses’ network without going over budget with the …

hospital
Researchers explore real-world deployment of connected medical devices

ZingBox researchers detected, identified and analyzed the behavior of medical devices deployed in more than 50 hospitals, clinics, and other healthcare locations. Researchers …

healthcare
Most healthcare breaches still come from hacking

In 2017 the number of individuals affected by breaches within the healthcare sector reached a four-year low. However, 71 percentof breaches in 2017 were due to hacking and IT …

critical infrastructure
Keeping on top of ICS-focused hacking groups, defenses

How many hacking groups are focusing on ICS systems? Dragos security researchers say at least five were active in 2017. “While only one has demonstrated an apparent …

IoT
Is your IoT strategy creating security holes?

Although most organizations plan to increase adoption of IoT into operations, only 28 percent consider security strategies specific to IoT as “very important.” Anticipated …

connection
SecOps reality gap: 85% say practicing SecOps is a goal, 35% actually do

More than half of companies (52 percent) admit to cutting back on security measures to meet a business deadline or objective. Based on a survey of over 200 senior-level …

professional
What employers need to know about cybersecurity jobseekers

Based on a blind survey of cybersecurity professionals in the United States and Canada, a new (ISC)² report reveals low numbers of highly engaged workers. Only 15% of …

Don't miss

Cybersecurity news