Cybercriminals innovate to find vulnerabilities that can be monetized
The global pandemic had a dramatic influence on the cybersecurity landscape in 2020. Cymulate, released its report on the 2020 security landscape and its impact on security …
10 strategies small security teams can use for effective cybersecurity management
As the challenges of smaller security teams are certainly different than with larger teams, these IT professionals must be more creative and pragmatic than their large …
How do I select a cloud security solution for my business?
Attackers increasingly strive to leverage cloud weaknesses that enable them to deliver malware to end users, gain unauthorized access to production environments or their data, …
Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
After earning his master’s degree in computer science and working on the IT side of the business at a number of large financial services organizations, Bobby Balachandran …
Physical cyber threats: What do criminals leave when they break in?
Many organizations have maintained heavy investment in cybersecurity over the last year, even in an unpredictable time when other spending has faltered. Gartner estimates that …
How do I select a network monitoring solution for my business?
A recent report predicts that home networks, remote working software and cloud systems will be at the center of a new wave of attacks in 2021. Cybercriminals in 2021 will …
10 COVID-19-related lessons for future-ready cybersecurity
In 2020, we experienced wave after wave of COVID-19 surges and watched failure after failure at practicing what we knew were effective preventative measures. Similarly, in …
Why do enterprise SOC teams need CIEM now?
What is CIEM? Among the many changes of 2020, Gartner added a new category: cloud infrastructure entitlement management (CIEM). While CIEM may sound similar to SIEM (security …
Tips for boosting the “Sec” part of DevSecOps
The most significant barrier to achieving DevSecOps is the continued perception that “Sec” is not already a part of “Dev” and “Ops”, says James Arlen, CISO at cloud data …
Knowledge graphs: The secret of Google Search and now XDR
Wading through waves of alert noise to find real threats and manually connecting the dots to find context in real-time attacks are essential capabilities in today’s …
Top 10 most used MITRE ATT&CK tactics and techniques
Which tactics and techniques are cyber attackers favoring? vFeed has compiled a list of the Top 10 Most Used MITRE ATT&CK Tactics and Techniques to help security teams …
How do I select a DRM solution for my business?
Digital rights management (DRM) is a method to protect copyrights for digital media. In a world where technology allows us to share and copy various media and files, it is …
Featured news
Resources
Don't miss
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd
- Ivanti Connect Secure zero-day exploited by attackers (CVE-2025-0282)
- The U.S. Cyber Trust Mark set to launch
- Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers
- Why an “all gas, no brakes” approach for AI use won’t work