69% of employees need to deal with more security measures in a hybrid work environment
Ivanti worked with global digital transformation experts and surveyed 10,000 office workers, IT professionals, and the C-Suite to evaluate the level of prioritization and …
Week in review: ZuoRAT targeting SOHO routers, trends affecting your security strategy
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: OT security: Helping under-resourced critical infrastructure organizations In …
New infosec products of the week: July 1, 2022
Here’s a look at the most interesting products from the past week, featuring releases from Fusion Risk Management, G-Core Labs, Rafay Systems, and RangeForce. Fusion Risk …
Product showcase: Group-IB Unified Risk Platform
The cyber threat landscape has intensified. Threat actors are organized and professionalized, with ransomware gangs outsourcing the first step of their operations to Initial …
Infosec products of the month: June 2022
Here’s a look at the most interesting products from the past month, featuring releases from: Acronis, Arcserve, Black Kite, Cavelo, Code42, ComplyCube, Cynet, Elastic, ESET, …
Evaluating the use of encryption across the world’s top one million sites
A new report from security researcher and TLS expert Scott Helme, evaluates the use of encryption across the world’s top one million sites over the last six months and reveals …
Evolving online habits have paved the way for fraud. What can we do about it?
Information is power, and personally identifiable information (PII) is an extremely powerful asset that is fueling the rapid growth of online fraud (also known as the Digital …
EMEA continues to be a hotspot for malware threats
Ransomware detections in the first quarter of this year doubled the total volume reported for 2021, according to the latest quarterly Internet Security Report from the …
Photos: Cyber Week 2022
Cyber Week is a large annual international cybersecurity event, hosted each year at Tel Aviv University in Israel. Cyber Week 2022 is held jointly by the Blavatnik …
Destructive firmware attacks pose a significant threat to businesses
As business workforces become increasingly distributed, IT leaders say it’s harder than ever to defend against firmware attacks, according to HP Wolf Security. The growing …
Why digital trust needs to be a strategic imperative for your company
It’s no secret that digital interactions have extended to every aspect of our professional and personal lives. Connectivity is soaring and digital transformation is …
Teams that shift security left and focus on attackability ship more secure code
ShiftLeft released its second annual AppSec Progress Report documenting critical trends in application security and how organizations are shifting security left to deal with …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA