cybersecurity

Global security trends for 2018: GDPR, identity and access security
In its third annual global IT security survey, Versasec found Europe’s General Data Protection Regulation (GDPR) is impacting security planning around the world, smart …

Vermeer’s Camera: Uncovering the link between art criticism and cybersecurity
My mother is a lacemaker; thus, her attachment to the Vermeer painting of that name. It’s in the Louvre. If you only know it from reproductions, it’s smaller than …

How to choose a penetration testing service
Penetration testing or pen testing for short is a simulation of an attack on your company’s IT infrastructure or specific assets in order to assess the security posture …

How to improve your security infrastructure when you’re on a budget
When you’re on a tight budget for cybersecurity, it can seem almost impossible to secure every part of your businesses’ network without going over budget with the …

Researchers explore real-world deployment of connected medical devices
ZingBox researchers detected, identified and analyzed the behavior of medical devices deployed in more than 50 hospitals, clinics, and other healthcare locations. Researchers …

Most healthcare breaches still come from hacking
In 2017 the number of individuals affected by breaches within the healthcare sector reached a four-year low. However, 71 percentof breaches in 2017 were due to hacking and IT …

Keeping on top of ICS-focused hacking groups, defenses
How many hacking groups are focusing on ICS systems? Dragos security researchers say at least five were active in 2017. “While only one has demonstrated an apparent …

Is your IoT strategy creating security holes?
Although most organizations plan to increase adoption of IoT into operations, only 28 percent consider security strategies specific to IoT as “very important.” Anticipated …

SecOps reality gap: 85% say practicing SecOps is a goal, 35% actually do
More than half of companies (52 percent) admit to cutting back on security measures to meet a business deadline or objective. Based on a survey of over 200 senior-level …

What employers need to know about cybersecurity jobseekers
Based on a blind survey of cybersecurity professionals in the United States and Canada, a new (ISC)² report reveals low numbers of highly engaged workers. Only 15% of …

Nearly half of security pros rarely change their security strategy, even after a cyber attack
Nearly half (46 percent) of IT security professionals rarely change their security strategy substantially – even after experiencing a cyber attack. This level of cyber …

Cybersecurity pros don’t feel equipped to stop insider attacks
Based on interviews with nearly 1,500 cybersecurity professionals over three years, Haystax Technology released a study that makes it clear that organizations are feeling the …
Featured news
Resources
Don't miss
- CISA warns of Windows SMB flaw under active exploitation (CVE-2025-33073)
- Official Xubuntu website compromised to serve malware
- Agentic AI security: Building the next generation of access controls
- When everything’s connected, everything’s at risk
- AI’s split personality: Solving crimes while helping conceal them