Please turn on your JavaScript for this page to function normally.
money
Things to keep in mind when raising capital for your cybersecurity venture

Long-term business success is rarely (if ever) a result of stumbling into opportunities and making makeshift decisions. In cybersecurity, as in any other industry, one might …

lock
The holiday season: A cybercriminal’s winter wonderland

It’s the most wonderful time of the year – for cybercriminals that is. With increased online sales, major commercial holidays like Black Friday and Cyber Monday present …

sharing
The cybersecurity labor crunch highlights gaps in threat intelligence practices

In Greek mythology, Sisyphus, the King of Corinth, was punished by Hades by being forced to roll a huge stone up a hill, only to have it roll down again as soon as he reached …

identity theft
The privacy and security trends that will shape 2020

Privacy concerns will ratchet up further around IoT and 5G. Even if the industry manages to secure the billions of IoT devices already deployed, they permeate so many aspects …

fix
The importance of proactive patch management

IT teams appreciate it when vendors or security researchers discover new vulnerabilities and develop patches for them. So do attackers. The same information that lets IT teams …

person
How to test employee cyber competence through pentesting

Social engineering hacking preys on the vulnerabilities inherent in human psychology. Take the Nigerian (419) scams as an example: the scammer tries to convince the victim to …

bomb
The 7 most dangerous digital technology trends

As our world embraces a digital transformation, innovative technologies bring greater opportunities, cost efficiencies, abilities to scale globally, and entirely new service …

hand
It’s the most vulnerable time of the year

With the holiday season upon us, it can be all too easy to get swept up in the festivities. As soon as the Halloween hangover starts to finally wear off, you’re already …

gap
Avoiding the next breach: Four tips for securing your apps

As security incidents continue to be an ongoing threat to businesses on a daily basis, keeping security procedures up-to-date and avoiding the next breach have become …

network
How DNS filtering works and why businesses need it

The Domain Name System (DNS) is a cornerstone of the internet. DNS servers connect URL names that humans can read to unique Internet Protocol (IP) addresses that web browsers …

build
Supply chain examination: Planning for vulnerabilities you can’t control

Seemingly, there are numerous occurrences when the customer’s personally identifiable information stored by an organization’s third-party provider is set loose by malicious …

secure
Prevent credential stuffing and account takeover attacks with these expert tips

Account takeover and credential stuffing attacks are two security threats that often go hand in hand. Both have become alarmingly prominent: a recent report found that …

Don't miss

Cybersecurity news