Please turn on your JavaScript for this page to function normally.
hybrid work
Five tips on how to stay (cyber)secure in a hybrid work world

From less time spent on the commute to a better work-life balance, maintaining the newly discovered possibilities of flexible working is a firm priority for workers today. For …

risk
Bridging the “front and back of the house”: A lesson in risk management

Between cloud proliferation, new tech infrastructure and tools and an increasingly distributed workforce, organizations are struggling to implement proper risk management …

Log4j
The Log4j debacle showed again that public disclosure of 0-days only helps attackers

On December 9, 2021, a (now deleted) tweet linking to a 0-day proof of concept (PoC) exploit (also now deleted) for the Log4Shell vulnerability on GitHub set the internet on …

skull
Experts uncover Elephant Beetle, an organized financial-theft operation

Sygnia announced that it has released its comprehensive report uncovering an organized financial-theft operation it has termed Elephant Beetle. For the past two years, the …

mobile security
Mobile security software market to reach $2.75 billion by 2025

The mobile security software market is expected to witness significant growth in the coming years with the increased adoption of mobile devices. For instance, the number of …

virtual reality
How can SMBs extend their SecOps capabilities without adding headcount?

Which is more important for achieving organizational cybersecurity: security products or security people? The right answer to this (trick) question is that both are equally …

shield
SMBs should consider new approaches for increasing their cybersecurity posture

SMBs can obtain advice about cybersecurity quite easily from a plethora of resources. Getting their hands on practical technology solutions is, on the other hand, more of a …

code
API security: Understanding the next top attack vector

Application Programming Interfaces (APIs) underpin today’s digital ecosystem as the essential connective tissue that allows companies to exchange data and information quickly …

data
How companies manage data and AI initiatives

NewVantage Partners has released the results of its annual Data and AI Leadership Executive Survey. In the Foreword to this year’s survey, NewVantage Partners CEO Randy Bean, …

Network
Embedded hypervisor software market to reach $1.16 billion by 2026

36% of the growth will originate from APAC for the embedded hypervisor software market. China and Japan are the key markets for embedded hypervisor software in APAC. Market …

The CISO's Guide to Third-Party Security Management
The CISO’s guide to third-party security management

Managing the security of your third parties is crucial, but security assessments are riddled with problems, including a lack of context, scalability and relevance. How can you …

shark
Should businesses be concerned about APT-style attacks?

As we enter 2022, organizations are re-evaluating their cybersecurity strategies to lower risks and best defend against potential threats. Through budget, risk tolerance, …

Don't miss

Cybersecurity news