Please turn on your JavaScript for this page to function normally.
phishing
How likely are employees to fall prey to a phishing attack?

22% of employees are likely to expose their organization to the risk of cyber attack via a successful phishing attempt, a Phished report reveals. Analysis of the broad and …

Magnify
Shifting security further left: DevSecOps becoming SecDevOps

Veracode has revealed usage data that demonstrates cybersecurity is becoming more automated and componentized in line with modern software architectures and development …

application security testing
GoTestWAF: Open-source project for evaluating web application security solutions

GoTestWAF is a tool for API and OWASP attack simulation that supports a wide range of API protocols including REST, GraphQL, gRPC, WebSockets, SOAP, XMLRPC, etc. It was …

White House
The cybersecurity executive order is not all it’s cracked up to be

Seventy-two percent of federal cybersecurity leaders say the White House’s May 2021 Cybersecurity Executive Order (EO) addresses only a fraction of today’s cybersecurity …

dotcom
Not all domain registrars are created equal: Consumer-grade vs. enterprise-class

SecurityScorecard and CSC released comprehensive research detailing the impacts of an organization’s choice in domain registrar on their overall security ratings. The research …

week in review
Week in review: Log4Shell updates, Kronos ransomware attack, unused identities threat

Here’s an overview of some of last week’s most interesting news, articles and interviews: Log4Shell: A new fix, details of active attacks, and risk mitigation …

New infosec products of the week: December 17, 2021

Here’s a look at the most interesting products from the past week, featuring releases from AwareGO, MetricStream, MobileSphere, Nerdio, Ping Identity, Pondurance, Syxsense, …

Develop a cybersecurity team
Want to assemble a cyber Dream Team? Look back at the ‘92 Olympics

A common question I often receive from organizational leaders is how to assemble the right team that can ensure their enterprise is positioned to effectively combat the …

user
Digital IDs don’t have to impinge on civil liberties and privacy

The shift towards an increasingly digital world has become overwhelmingly apparent. The coronavirus era has forced a technological leap on all fronts, and incumbent …

immudb
Immudb: Open-source database, built on a zero trust model

Now, with full transactional support for everyday business applications, the open source immudb tamper-proof database can serve as the main transactional database for …

cloud complexity
Why is a well thought-out approach to cloud migration imperative?

The big move to the cloud is bringing as many challenges as opportunities, a database monitoring survey from Redgate has found. With 80% of organizations now using a mix of …

stats
European UCaaS market to gain momentum in 2022

A ResearchAndMarkets study provides an in-depth analysis of trends, growth factors and growth opportunities in the European UCaaS market. UCaaS providers will pursue untapped …

Don't miss

Cybersecurity news