Please turn on your JavaScript for this page to function normally.
Paying the ransom is not a good recovery strategy

A Veeam report has found that 72% of organizations had partial or complete attacks on their backup repositories, dramatically impacting the ability to recover data without …

Since organizations apply more compliance programs, proper planning is essential

A-LIGN released its 2022 Compliance Benchmark Report, highlighting the concern over increased threat of ransomware attacks and the need for organizations to adopt a more …

Facepalm
Taking the right approach to data extortion

Cybercriminals often specialize. An extortion effort usually begins with a person or a team selecting targets in one of two ways: either they get a request from an …

hands
You should be able to trust organizations that handle your personal data

People have become much more sensitive about privacy and are more concerned about who has access to their data, but at the same time they are constantly sharing that …

professional
Many security engineers are already one foot out the door. Why?

The position of security engineer has become a pivotal role for modern security teams. Practitioners are responsible for critical monitoring of networks and systems to …

check
Fix your IT weak spots to guarantee compliance

As the number of regulations grow each day, and are different depending on the sector, the consequence of not adhering to them has come more and more severe. It can massively …

CIS Hardened Images
Easily migrate to the cloud with CIS Hardened Images

CIS offers virtual images hardened in accordance with the CIS Benchmarks, a set of vendor agnostic, internationally recognized secure configuration guidelines. CIS Hardened …

data
Mastering microsegmentation for enterprise applications

Network segmentation is one of the defensive practices used by many enterprises to stop the spread of malware in the ecosystem. Servers and databases are grouped together by …

password
The most insecure and easily hackable passwords

No matter how annoying juggling too many passwords can be, for better or worse they are one thing end users have control over. But while choosing a password is easy, choosing …

The state of mental health in the cybersecurity community

A report from Tines revealed the state of mental health among cybersecurity professionals. The past few years have been particularly challenging. Remote work, talent shortage, …

DDoS
Why are DDoS attacks so easy to launch and so hard to defend against?

DDoS attacks are an underappreciated residual risk for most organizations today. While most people are concerned about ransomware, it typically takes a ransomware attacks …

Secure your CMS-based websites against pervasive attacks

Sucuri Security’s 2021 Website Threat Research Report has revealed that payment card skimmers are becoming more common in exploit kits affecting WordPress websites, and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools