Please turn on your JavaScript for this page to function normally.
architecture
As technology pervades, CIOs’ influence on business strategy grows

An IBM Institute for Business Value (IBV) study revealed CIOs’ influence on business strategy and operations is growing as technology pervades surveyed enterprises. When …

industry
Industrial cybersecurity market to reach $22.3 billion by 2026

The global market for industrial cybersecurity estimated at $15.2 billion in the year 2020, is projected to reach a revised size of $22.3 billion by 2026, growing at a CAGR of …

passwordless
The world’s worst kept secret and the truth behind passwordless technology

One of the biggest security risks of modern-day business is the mass use of passwords as the prime authentication method for different applications. When the technology was …

collaboration
Eliminate cyber friction with smarter technology

In modern organizations, it’s natural for there to be some friction between cybersecurity teams and employees. While the cybersecurity teams defends the …

identity
Humanizing hackers: Entering the minds of those behind the attacks

Have you ever wondered what are hackers like, where they are based, and what are they thinking? They are human like everyone else – you wouldn’t be able to tell a hacker from …

DDoS
DDoS attacks were a more serious threat in Q3 2021 than ever before

Link11 has released new data from its network on the development of the DDoS threat: The number of attacks remains at a very high level in Q3 2021. After Q2 2021 had already …

Phishing
Phishing attacks grow 31.5% over 2020, social media attacks continue to climb

Phishing remains the dominant attack vector for bad actors, growing 31.5 percent over 2020, according to a PhishLabs report. Notably, attacks in September 2021 were more than …

gift
As the holiday season approaches, threats to supply chain, e-commerce and travel soar

During the pandemic, 81% of global organizations experienced increased cyber threats with 79% experiencing downtime due to a cyber incident during a peak season, McAfee and …

fight
Are you less capable of innovation or more vulnerable to threats than you thought?

A Syntax research shows a critical reality check on perception versus reality among IT and finance decision-makers when it comes to enterprise innovation, whether it is …

alert
Vulnerabilities in Nucleus NET TCP/IP stack could lead to real-world damage

Researchers have unearthed 13 vulnerabilities affecting the Nucleus NET TCP/IP stack and have demonstrated how attackers could exploit them to cause serious real-world damage. …

zero
The role of visibility and analytics in zero trust architectures

Zero trust architecture (ZTA) is not a new concept, but with the White House Executive Order published earlier this year, many in the networking space have started to ask …

ransomware
Organizations believe they are ready for ransomware attacks

Over the past year there has been a dramatic rise in ransomware attacks, and while all organizations are a target, large enterprises are bearing the brunt – experiencing …

Don't miss

Cybersecurity news