Please turn on your JavaScript for this page to function normally.
cloud
Application and cloud security is a shared responsibility

Cloud environments and application connectivity have become a critical part of many organizations’ digital transformation initiatives. In fact, nearly 40% of North American …

vectors
Attack surface management (ASM) is not limited to the surface

Another year of high-profile cyberattacks, another year of beating the cybersecurity drums. Clearly, we’re missing a few notes. Attack surface management (ASM) is a make or …

Cynomi vCiso
The risks and benefits of starting a vCISO practice

There is a definite trend of MSPs shifting into security. There are a number of very good reasons for this, including the fact that other services traditionally offered are …

CISA
Steps CISA should take in 2023

Recently, I was asked to imagine that I had been granted an hour with top officials at the Cybersecurity and Infrastructure Security Agency (CISA) – what advice would I …

SaaS
Reimagining zero trust for modern SaaS

The concept of zero trust – as a way to improve the security of and access to an organization’s network, systems, and data – has gained traction in recent …

patch
February 2023 Patch Tuesday forecast: A Valentine’s date

Patch Tuesday falls on Valentine’s Day this year but will it be a special date? While there have been ongoing cyber-attacks of all kinds, it has been relatively quiet on the …

Support
The dangers of unsupported applications

Are ageing technologies and infrastructure threatening the security and productivity of your business? A recent investigation by the National Audit Office (NAO – UK’s …

Hands
Establishing secure habits for software development in 2023

As a new year commences, it’s not unusual for people to take the opportunity to adopt better practices and principles and embrace new ways of thinking in both their personal …

brain
Generative AI: A benefit and a hazard

If there’s one thing people will remember about AI advances in 2022, it’ll be the advent of sophisticated generative models: DALL.E 2, Stable Diffusion, …

IoT
India-China relations will define the IoT landscape in 2023

Tensions between two of the biggest producers of connected (IoT) devices are coming to a head, and will be changing the IoT landscape in 2023. In recent months, India and …

identity theft
What a perfect day in data privacy looks like

Everyone wants extraordinary online experiences without sacrificing the security of their personal information. Yet according to Ping Identity’s 2022 Consumer Survey, 77% of …

critical infrastructure
We can’t rely on goodwill to protect our critical infrastructure

How far is too far for a hacker? Earlier this year the Lockbit ransomware-as-a-service organization apologized and provided a free decryptor following a ransomware attack on a …

Don't miss

Cybersecurity news