Please turn on your JavaScript for this page to function normally.
account
How to motivate employees to take cybersecurity seriously

How can we push employees / users to take cybersecurity to heart? Dr. Maria Bada, external behavioral scientist at AwareGO, has been working on the answer for years. After …

5G
5G core market size to reach $9.497 million by 2025

The global 5G core market size is projected to grow from $630 million in 2020 to $9.497 million by 2025, at a CAGR of 72.0% during the forecast period, according to …

Office 365
Business executives targeted with Office 365-themed phishing emails

An ongoing campaign powered by a phishing kit sold on underground forums is explicitly targeting high-ranking executives in a variety of sectors and countries with fake Office …

SonicWall
SonicWall hit by attackers leveraging zero-day vulnerabilities in its own products?

On Friday evening, SonicWall announced that it “identified a coordinated attack on its internal systems by highly sophisticated threat actors exploiting probable …

zero
Zero trust: A solution to many cybersecurity problems

The SolarWinds hack and the never-ending stream of revelations about the attackers’ tools, techniques and other targets has been occupying the minds of CISOs and …

idea
Automation and no-code are driving the future of business operations

More than 95% of respondents indicated that business operations has become a more important function in their organization in the past year, a Tonkean survey reveals. The …

money
CFOs taking strategic roles after overcoming COVID-19 challenges

CFOs are taking on greater strategic and enterprise-building roles after guiding their organizations through the challenges of COVID-19. CFO Research of Argyle Advisory & …

user
How employees view and manage company security

As many companies continue to grapple with a remote workforce, overall employee security measures become more critical, especially as many are relying on personal devices and …

gears
Security automation: Time for a new playbook

From increasingly sophisticated threats to the mad concoction of on-premise and cloud solutions that comprise most organizations’ IT infrastructure and the plethora of new IoT …

bomb
Vulnerable TCP/IP stacks open millions of IoT and OT devices to attack

Forescout researchers have discovered 33 vulnerabilities affecting four open source TCP/IP (communications) stacks used in millions of connected devices worldwide. …

syringe
Hackers are targeting the COVID-19 vaccine supply chain

Unknown hackers have been trying to compromise accounts and computer systems of employees in organizations involved in the COVID-19 vaccine supply chain. While it’s …

Which security practices lead to best security outcomes?

A proactive technology refresh strategy and a well-integrated tech stack are, according to a recent Cisco report, two security practices that are more likely than many others …

Don't miss

Cybersecurity news