Please turn on your JavaScript for this page to function normally.
IoT security
Where should companies start when it comes to device security?

The Internet of Things (IoT) market has a security problem that is boiling over into a business issue. According to a recent survey conducted by the Ponemon Institute, 59% of …

certificate
Lack of CLM maturity is putting organizations at risk

More than a year after the historic and damaging SolarWinds attack, nearly 65% of organizations still are unable to secure and govern the growing volume of machine and …

DDoS
DDoS attacks becoming larger and more complex, finance most targeted sector

Distributed Denial-of-service (DDoS) attacks decreased slightly in 2021 but are becoming larger and more complex in nature, an analysis from F5 has found. Data showed a 3% …

healthcare
Deploying pseudonymization techniques to protect health data

A report of the European Union Agency for Cybersecurity (ENISA) explores how pseudonymization techniques can help increase the protection of health data. The healthcare sector …

fist
Why do organizations need to prioritize cyber resiliency?

OpenText announced a report which provides in-depth analysis, market insights, trend data, and predictions for what lies ahead as organizations move toward strengthening their …

BYOD
BYOD and enterprise mobility market to reach $157.3 billion by 2026

Amid the COVID-19 crisis, the global market for BYOD and enterprise mobility estimated at $84.4 billion in the year 2022, is projected to reach a revised size of $157.3 …

malware
Mars Stealer malware pushed via Google Ads and phishing emails

Cybercriminals trying to foist the Mars Stealer malware onto users seemingly have a penchant for one particulat tactic: disguising it as legitimate, benign software to trick …

user
Web3 and the future of data portability: Rethinking user experiences and incentives on the internet

Tech conversations are now peppered with a new, contentious buzzword: Web3, and we’re all likely to hear a lot more of it in the coming years. It’s an umbrella term for …

How to recruit cybersecurity talent from atypical backgrounds

In this interview with Help Net Security, Max Shuftan, Director of Mission Programs & Partnerships at SANS Institute, talks about how companies and the cybersecurity …

cybersecurity
Product showcase: Secure online authentication “Made in Germany” by Swissbit

New iShield FIDO2 USB-A / NFC security key protects access to applications and online services. Today it is more critical than ever before for businesses to equip themselves …

insider threat
Posts on name-and-shame dark web leak sites climbed 85% in 2021

Ransomware payments hit new records in 2021 as cybercriminals increasingly turned to dark web leak sites where they pressured victims to pay up by threatening to release …

hardware
The benefits of implementing continuous security in the development lifecycle

Wabbi published new research with IDG that finds companies utilizing continuous security have decreased vulnerabilities by 50%. The study focused on the integration of …

Don't miss

Cybersecurity news