Please turn on your JavaScript for this page to function normally.
icosahedral
Data visualization: An invaluable tool in a defender’s arsenal

Visibility is always a priority, but it’s vital when responding to an incident. Time is always working against incident responders. Looking through rows of text data and …

RedEye
CISA releases RedEye open-source analytic tool

CISA has released RedEye, an interactive open-source analytic tool to visualize and report Red Team command and control activities. RedEye, available on GitHub, allows an …

search
The dangers of orphaned data and what companies can do about it

Orphaned data is data that still sits on an organization’s network but was created and owned by a now deactivated employee. In this Help Net Security video, Carl …

numbers
Why organizations take data sovereignty seriously

According to a Vanson Bourne survey, the vast majority of organizations across France, Germany, the UK, and the US either have sovereignty regulations or policies to keep …

hands
Data security trends: 7 statistics you need to know

U.S. businesses are at high risk for data security threats from increasingly effective phishing attempts and the lack of procedures to restrict data access, according to …

architecture
3 ways to gauge your company’s preparedness to recover from data loss

Use these three questions to assess your company’s preparedness to retrieve lost data. 1. Do you have backups of your data? This fundamental question is the basis of …

data
How serious are organizations about their data sovereignty strategies?

Scality announced the results of an independent survey of IT decision makers across France, Germany, the UK, and the US about their data sovereignty strategies. 98% of …

burn
Outdated infrastructure remains a problem against sophisticated cyberattacks

A global research commissioned by Cohesity reveals that nearly half of respondents say their company depends on outdated, legacy backup and recovery infrastructure to manage …

files
What’s polluting your data lake?

A data lake is a large system of files and unstructured data collected from many, untrusted sources, stored and dispensed for business services, and is susceptible to malware …

IoT
Data privacy regulation a top three challenge for IoT adopters

Fears over security have become less of a concern for organizations adopting IoT solutions than it was five years ago, according to a recent study by Wi-SUN Alliance, a global …

Data
Using real customer data in testing environments creates unnecessary risk

A new study polling 1,000 software developers and startup employees found 29% of companies use unprotected production data (real customer data) in testing environments when …

location services
The weaponizing of smartphone location data on the battlefield

For soldiers on the battlefield, the act of turning on one’s smartphone has been described as the digital equivalent of lighting a cigarette, as doing so creates a signal …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools