Please turn on your JavaScript for this page to function normally.
malware
Detect and identify IoT malware by analyzing electromagnetic signals

Electromagnetic (EM) emanations can be recorded and used to detect and identify malware running on IoT devices, a group of researchers working at IRISA have proven. The setup …

2022
What to expect in 2022 privacy wise?

DeleteMe releases its privacy predictions for 2022, based on developments seen in 2020/2021 as well as original research conducted for its 2021 PII Marketplace Report. …

encryption
Eight resolutions to help navigate the new hybrid office model

Continuous review and improvement are crucial for a successful security program. As this year draws to a close, it is a good time to look back on 2021 and prepare a few …

cloud
On-premises cloud: The worst of both worlds?

As 2022 begins, the demand for cloud-fueled IT services has reached an all-time high. Given the tumult of the past two years, it’s understandable that businesses should be …

2022
6 cloud security trends to watch for in 2022

It’s fascinating to take a step back and look at how “the cloud” developed over the last two decades. There has been a lot of innovation that has sparked a new wave of …

market
Unified communications market size to reach $344.84 billion by 2028

The global unified communications market size is expected to reach $344.84 billion by 2028 and is expected to expand at a CAGR of 20.5% from 2021 to 2028, according to …

week in review
Week in review: Discussing cybersecurity with the board, APT-style attacks, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles and interviews: January 2022 Patch Tuesday forecast: Old is new again Let’s look at some …

patch
January 2022 Patch Tuesday forecast: Old is new again

Welcome to 2022 and a new year of patch management excitement! I’m rapidly approaching 40 years working in this industry and I can honestly say there is rarely a dull day. If …

person
Supply chain cybersecurity: Pain or pleasure?

Whatever sector your business operates in, you will depend on third parties to provide you with goods and services to support what you do. Whether you are a small printing …

collaboration
Network and security teams must collaborate to successfully deliver digital transformation

Collaboration is a key component of any successful business strategy, but it’s not always a simple task. The conflicting goals of individual teams means that different …

certificate
Enterprise PKI automation: The modern approach to certificate lifecycle management

Today’s modern enterprises face massive surges in the use of digital identities, both for machines, (servers, laptops and network devices) and for the humans who use them. In …

Skull
Antivirus software market to reach $4.54 billion in 2025

The global antivirus software market is expected to grow from $3.80 billion in 2020 to $3.92 billion in 2021 at a compound annual growth rate (CAGR) of 3.2%. The market is …

Don't miss

Cybersecurity news