How to avoid compliance leader burnout
There has been a lot of talk about the sharp increase in workplace burnout. The WHO defines burnout as a syndrome resulting from chronic workplace stress that has not been …
Medical device cybersecurity: What to expect in 2022?
Cybellum released a survey report about medical device cybersecurity, along with trends and predictions for 2022. Medical device cybersecurity has become an extremely complex …
41% of businesses had an API security incident last year
In the wake of the digital transformation wave, web application program interfaces (APIs) have experienced exponential growth as the rise of integrated web and mobile-based …
Phishing attacks soar, retail and wholesale most targeted
Zscaler released the findings of a report that reviews 12 months of global phishing data from its security cloud to identify key trends, industries and geographies at risk, …
Week in review: Outdated open source, the role of the lawyer in cybersecurity
Here’s an overview of some of last week’s most interesting news, articles and interviews: The changing role of the CCO: Champion of innovation and business continuity In this …
Issue in digital COVID-19 test could have allowed individuals to falsify results
WithSecure and Cue Health have worked together to address a security issue that WithSecure discovered in Cue’s COVID-19 test, which delivers the results of a nasal swab test …
New infosec products of the week: April 22, 2022
Here’s a look at the most interesting products from the past week, featuring releases from Arcanna.ai, Finite State, Hillstone Networks, Prevailion, and Vicarius. Prevailion …
The Great Resignation meets the Great Exfiltration: How to securely offboard security personnel
“The Great Resignation” is a phenomenon that has greatly impacted how we work. As of August 2021, 65% of people in the United States were looking for a new job and 25% of them …
Backup is key for cyber recovery
Granular and air-gapped backup are critical to data recovery, when, not if, a business falls victim to ransomware. Those are among the key takeaways from an Enterprise …
New threat groups and malware families emerging
Mandiant announced the findings of an annual report that provides timely data and insights based on frontline investigations and remediations of high-impact cyber attacks …
Slow deployment is hampering fraud prevention. What gives?
In May, Okta finalized its acquisition of Auth0 for $6.5 billion. Every company loves to add a shiny new toy to its arsenal, but this move sent a clear message to enterprise …
How fast do cybercriminals capitalize on new security weaknesses?
Threat intelligence analysts at Skybox Research Lab uncovered a 42% increase in new ransomware programs targeting known vulnerabilities in 2021. The report revealed how …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader