How will the cybersecurity industry evolve in 2022?
The cybersecurity landscape has always been dynamic. However, this past year highlighted vulnerabilities and attack vectors that will drive trends and shape global …
External attackers can penetrate most local company networks
In 93% of cases, external attackers can breach the organization’s network perimeter and gain access to local network resources, and it takes an average of two days to …
Developments that will define data governance and operational security in 2022
Satori shared its predictions for the near future of cloud-based transformation, detailing three major developments to watch for in the world of data governance and …
Enterprise data loss prevention market to reach $6.265 billion by 2026
The global enterprise data loss prevention market is projected to grow at a CAGR of 21.03% to reach $6.265 billion by 2026, from $1.647 billion in 2019, according to …
4 practical strategies for Log4j discovery
For security teams scrambling to secure their organizations against Log4j exploitation, one of the first and most challenging tasks is understanding where Log4j exists within …
How to avoid “festive fraud” during the holiday season
The year-end holiday season is a time for celebration – a chance to decorate homes, splurge on gifts and gather with family and friends. It’s also a time when the scammers …
Manufacturers of IoT devices should step up when it comes to security
With significant growth projected in the global IoT market over the next 6 years, the need to subsequently secure devices at the edge from attacks, safe and secure through the …
Web app attacks are skyrocketing, it’s time to protect APIs
Web app attacks against UK businesses have increased by 251% since October 2019, putting both organizations and consumers at risk, an Imperva reserach reveals. In a study of …
Five megatrends for 5G mmWave for 2022 and beyond
It’s been a tumultuous year for 5G as wireless carriers scrambled to deploy their networks at mid-band and increasingly millimeter-wave frequencies, and the trend will …
Week in review: Log4j new vulnerabilities, Microsoft patch bypass, 2022 e-commerce threat trends
Here’s an overview of some of last week’s most interesting news, articles and interviews: The Log4j saga: New vulnerabilities and attack vectors discovered The …
New infosec products of the week: December 24, 2021
Here’s a look at the most interesting products from the past week, featuring releases from BlackBerry, Box, and Veriff. Veriff’s metaverse identity verification solution …
Bots are stealing Christmas!
Kasada released new data on the latest fraud and malicious automation trends, revealing increased threats during the holidays; rising attacks by bots; and the discovery of a …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader