
A closer look at fileless malware, beyond the network
Cybersecurity is an arms race, with defensive tools and training pushing threat actors to adopt even more sophisticated and evasive intrusion techniques as they attempt to …

2020 set the stage for cybersecurity priorities in 2021
It’s safe to assume that pretty much everyone is ready to move on from 2020. Between the COVID-19 pandemic, political battles, and social unrest, this has been a stressful …

Worldwide VPN market to reach $75.59 billion by 2027
The global VPN market was valued at $25.41 Billion in 2019 and is projected to reach $75.59 Billion by 2027, growing at a CAGR of 14.7% from 2020 to 2027, Valuates Reports …

2021 will overburden already stressed infosec teams
The year 2020 has given us a contentious U.S. election, a global economic crisis, and most notably a global pandemic. Disinformation has wreaked havoc in our ability to …

U.S. cybersecurity: Preparing for the challenges of 2021
In 2020, cybersecurity became a business problem for every industry, as well as the U.S. government. According to a new report by the Aspen Cybersecurity Group, there are …

As technology develops in education so does the need for cybersecurity
The COVID-19 pandemic has had a profound impact on education, bringing about a sudden boom in remote and online learning. While the transition has forced many schools to …

Tech’s bigger role in pharma industry demands stronger security measures
For healthcare and pharmaceutical IT professionals, the launch of Amazon Pharmacy in late November signaled the acceleration of digitized pharma. But Amazon’s move into …

Steps IT pros can take to prioritize interpersonal needs
Most people in the IT industry are familiar with the phrase “people, process, and technology.” While there are many technology and process standards within organizations, and …

Operational planning simulation for defense against an attacking drone swarm
The 2018 Winter Olympics in PyeongChang, South Korea stunned the world when they put on a dazzling light show made up of a record-breaking 1,218 drones, all dancing in …

Five ways COVID-19 will change cybersecurity
The main story of 2021 won’t be the disease, but the vaccine. With three effective, promising vaccines in development as of November, COVID-19 (and its treatment) will …

Disruption in 2020 paves the way for threat actors in 2021 and beyond
There’s no doubt that 2020 will be remembered for the uncertainty and rapid change it brought. As the global pandemic accelerated trends like remote working and digital …

5 reasons IT should consider client virtualization
Virtualization has brought a dramatic level of growth and advancement to technology and business over the years. It transforms physical infrastructure into dedicated, …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility