Please turn on your JavaScript for this page to function normally.
keys
How passkeys are changing the face of authentication

As passwordless identity becomes mainstream, the term “passkey” is quickly becoming a new buzzword in cybersecurity. But what exactly is a passkey and why do we need them? A …

AI
2024 cybersecurity predictions: GenAI edition

Unless you have lived under a rock for the past year, you know that generative artificial intelligence applications, such as ChatGPT, have penetrated many aspects of our …

laptop
The must-knows about low-code/no-code platforms

The era of AI has proven that machine learning technologies have a unique and effective capability to streamline processes that alter the ways we live and work. We now have …

internet
Reinforcing cybersecurity: The network’s role to prevent, detect, and respond to attacks

It’s always DNS. That’s what the famous internet meme popular among sysadmins says anyway. It’s funny because while clearly, every network issue doesn’t resolve to some funky …

data analytics
How to go from collecting risk data to actually reducing risk?

Organizations trying to cope with securing their expanding attack surfaces eventually find themselves at a crossroads: they need to move beyond finding risks to effectively …

target
DIY attack surface management: Simple, cost-effective and actionable perimeter insights

Modern-day attack surface management (ASM) can be an intimidating task for most organizations, with assets constantly changing due to new deployments, assets being …

servers
Quantum risk is real now: How to navigate the evolving data harvesting threat

In an era where data security is paramount, the recent revelations about firmware backdoors implanted by Chinese government-backed hackers serve as a stark reminder of the …

Keeping up with the demands of the cyber insurance market

Cyber insurance has been around longer than most of us think. When American International Group (AIG) launched the first cyber insurance policy in 1997, it stepped into …

zero trust
Why zero trust delivers even more resilience than you think

Ten years ago, zero trust was an exciting, innovative perspective shift that security experts were excited to explore; today, it’s more likely to be framed as an inevitable …

digital identity
Selective disclosure in the identity wallet: How users share the data that is really needed

Name, date of birth, address, email address, passwords, tax records, or payroll – all this sensitive user data is stored by companies in huge databases to identify individuals …

patch Tuesday
October 2023 Patch Tuesday forecast: Operating system updates and zero-days aplenty

UPDATE: October 10, 12:10 PM PT – October 2023 Patch Tuesday is now live: Microsoft fixes exploited WordPad, Skype for Business zero-days September has been a packed …

connected
Eyes everywhere: How to safely navigate the IoT video revolution

Cameras are coming to a connected device near you. Cheap image sensors from old mobile phones are flooding the market and bringing video to the Internet of Things (IoT). …

Don't miss

Cybersecurity news