What do successful pentesting attacks have in common?
In external penetration testing undertaken for corporate clients in industrial, financial, and transport verticals in 2018, Positive Technologies found that, at the vast …
Lookalike domains: Artificial intelligence may come to the rescue
In the world of network security, hackers often use lookalike domains to trick users to unintended and unwanted web sites, to deliver malicious software into or to send data …
5 reasons why asset management is a hot topic
Sometimes buzzwords are good predictors of what organizations see as priorities in a given year. If you surveyed both the revenue-generating and security functions of …
The impact of cyber-enabled economic warfare escalation
The results of a tabletop exercise on cyber-enabled economic warfare find that when a large-scale destructive cyberattack occurs, the United States and the private sector must …
70 real-life hackers and cybersecurity practitioners share their personal insights
Entering the information security industry can be a formidable undertaking and renowned professionals often seem larger than life and unapproachable (even though most are on …
Four differences between the GDPR and the CCPA
By passing the California Consumer Privacy Act (CCPA), which goes into effect on January 1, 2020, the Golden State is taking a major step in the protection of consumer data. …
Safeguarding your data from human error and phishing attacks with the cloud
This is the third article of a series, the first article is available here, and the second one is here. In a world of ransomware attacks, companies should prepare for the …
Taking ethical action in identity: 5 steps for better biometrics
Glance at your phone. Tap a screen. Secure access granted! This is the power of biometric identity at work. The convenience of unlocking your phone with a fingertip or your …
Free training course material on network forensics for cybersecurity specialists
Based on current best practices, the training includes performance indicators and means that will help those who take it increase their operational skills of tackling cyber …
How privacy and security concerns affect password practices
Yubico announced the results of the company’s 2019 State of Password and Authentication Security Behaviors Report, conducted by the Ponemon Institute, who surveyed 1,761 IT …
What steps consumers need to take to protect themselves online
Yesterday was Data Privacy Day, so McAfee warned consumers that cybercriminals are continuing to access personal information through weak passwords, phishing emails, connected …
ENISA outlines top cyber threats and trends in 2018
In 2018, the cyber threat landscape changed significantly. The most important threat agent groups, namely cyber-criminals and state-sponsored actors have further advanced …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades