Please turn on your JavaScript for this page to function normally.
programming
Low code applications are essential for cybersecurity development in applications

One of the biggest changes to the cybersecurity landscape is that developers are now often expected to implement security directly into the applications they’re building as …

chess
Why security strategies need a new perspective

After a stream of ransomware campaigns, data leaks, and attacks on critical infrastructure, businesses understand their digitization strategy needs to be complemented by a …

lightbulb
Why cybersecurity and anti-fraud teams need to collaborate

Over the past couple of years, there has been unprecedented change in the world of financial services. The shift to online banking has accelerated the need for digital …

Cloud
Google announces threat detection for virtual machines in its cloud

Google is adding a new defensive layer to protect enterprise workloads running in Google Cloud. It’s called Virtual Machine Threat Detection (VMTD), and will help select …

person
The four types of remote workers your security awareness program must address

No matter how much technology you acquire or how many specific technical controls you install, when it comes to your information security awareness program, the most important …

Contextualizing supply chain risks in a SaaS environment

In the wake of the SolarWinds and Kaseya attacks, third-party cybersecurity risks remain top of mind for security leaders. Nonetheless, CISOs continue to experience …

lens
AI technology is redefining surveillance

Surveillance today is narrowly defined as “continuous observation of a place, person, group, or ongoing activity in order to gather information,” especially when the subject …

chess
Two initiatives that can move the needle for cybersecurity in 2022

It’s no secret that 2021 was undoubtedly a difficult and stressful year to be a cybersecurity professional. The pandemic-driven remote/hybrid work paradigm and increased …

danger
Why vulnerability scanners aren’t enough to prevent a ransomware attack on your business

Vulnerability scanners are still essential tools for defenders protecting enterprise and government networks. But given the rapidly increasing complexity of today’s …

identify
Reducing the blast radius of credential theft

Cybersecurity has come to be defined by identity, with almost every attack today revolving around gaining control of a user’s identity as a means of accessing critical data …

AI
Why we can’t put all our trust into AI

According to theoretical physicist Michio Kaku, “The human brain has 100 billion neurons, each neuron connected to 10,000 other neurons. Sitting on your shoulders is the most …

Log4j
How would zero trust prevent a Log4Shell attack?

There is a seemingly trivial solution to any remote code execution attack, namely: do not to let the inbound traffic match the pattern that triggers the vulnerability of the …

Don't miss

Cybersecurity news