How to empower IT Sec and Ops teams to anticipate and resolve IT problems
Every IT system administrator knows the misery of facing a problem for which the root cause requires hours (and sometimes days) to unearth, all the while part of the IT …
Apps, devices and workloads provide an ecosystem cornerstone for zero trust growth
As cybersecurity professionals, we admit it: zero trust has become the industry’s biggest buzzword. Some argue it’s a principle, others argue it’s a framework, others still …
Lack of visibility plaguing ICS environments
Dragos released its report on cyber threats facing industrial organizations, naming the emergence of three new threat groups targeting ICS/OT environments, including two that …
How businesses benefited from cloud transformation
Aptum released a report which explores the deployment of workloads on different cloud infrastructures and examines the decision-making process behind their placement. The …
IoT security is foundational, not optional
A PSA Certified report predicts that this year will mark a turning point in securing the Internet of Things (IoT), as the industry collectively commits to addressing the …
The importance of balancing security requirements and employee user experience
LastPass released the findings of an IDC survey which revealed that “balancing company security requirements and the employee user experience” is the number one identity …
Security and vulnerability management market to reach $15.86 billion by 2030
The global security and vulnerability management market is expected to grow from $6.7 billion in 2020 to $15.86 billion by 2030, at a CAGR of 9% during the forecast period …
Infosec products of the month: February 2022
Here’s a look at the most interesting products from the last month, featuring releases from: Arista Networks, Blueshift Cybersecurity, Bugcrowd, Cato Networks, Cofense, …
Open XDR Summit: Showing how Open XDR transforms security operations today
Open XDR Summit is a community of cybersecurity professionals who are using Open XDR to cost-effectively reduce risk while dramatically improving productivity and confidence. …
Take a dev-centric approach to cloud-native AppSec testing
The era of the cloud-native application is well and truly upon us: IDC researchers have predicted that by 2023, more that 500 million apps will be developed using cloud-native …
Product showcase: SharePass – Secure communication made simple
We all know the numbers. Data breaches are up 30% year over year, ransomware runs rampant without showing any signs of slowing, and identity theft reports have doubled to …
Cybercrime getting more destructive, remote workers in the crosshairs
Fortinet’s threat intelligence from the second half of 2021 reveals an increase in the automation and speed of attacks demonstrating more advanced persistent cybercrime …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)