Please turn on your JavaScript for this page to function normally.
bomb
Is next-gen threat modeling even about threats?

The threat landscape evolves with technology, and as threats grow in sophistication, there are concerns about major events like the Colonial Pipeline ransomware attack or the …

Terminal
Why low-code and identity must co-exist

Software development has emerged as a critical task for organizations looking to compete in the digital economy. It increasingly fuels innovation and even disruption. Yet, …

virtual reality
Extended Threat Intelligence: A new approach to old school threat intelligence

The world is shaken by different new crises and cyber events every day. All sectors are affected by the events, either in terms of production, transportation, or security. The …

DDoS
Cybercriminals launched 9.75 million DDoS attacks in 2021

During the second half of 2021, cybercriminals launched approximately 4.4 million Distributed Denial of Service (DDoS) attacks, bringing the total number of DDoS attacks in …

cloud
Cloud-native adoption shifts security responsibility across teams

Styra released a research report which explores how in sync, or misaligned, IT leaders and developers are when it comes to cloud-native technology use and security during …

Metaverse
The importance of data in the metaverse

A research from Bright Data has highlighted the importance of data in virtual environments such as the metaverse. The survey, conducted by Vanson Bourne, generated insights …

risk
Operational risk management solution market to reach $3,098.0 million by 2028

The global operational risk management solution market size is expected to grow from $1,656.4 million in 2021 to $3,098.0 million by 2028; operational risk management solution …

week in review
Week in review: Lapsus$ breaches Okta and Microsoft, Red Team 101, cybersecurity during M&As

Here’s an overview of some of last week’s most interesting news, articles and interviews: Lapsus$ gang says it has breached Okta and Microsoft After breaching NVIDIA and …

New infosec products of the week: March 25, 2022

Here’s a look at the most interesting products from the past week, featuring releases from AvePoint, DTEX Systems, ExtraHop, NICE Actimize, and Sonrai Security. NICE Actimize …

cloud
The challenge of planning an IAM strategy for multi-cloud environments to avoid risk

According to the Strata Identity and Forrester study, 78% of IT decision-makers said managing user identities between multiple clouds is the number one challenge. The study …

wolf
Trends, threats and techniques that comprised the 2021 threat landscape

Ransomware dominated the threat landscape in 2021, with groups adopting new techniques such as double extortion and “as-a-service” models to evade detection and maximize their …

cloud complexity
How the cloud skills gap is hindering business development

Cloudreach released data highlighting the latest cloud technology trends, underscoring the impact the cloud skills gap is having on businesses. More than 70% of surveyed IT …

Don't miss

Cybersecurity news