Please turn on your JavaScript for this page to function normally.
organize
Understanding and stopping 5 popular cybersecurity exploitation techniques

With more than 550,000 new malware samples being discovered every day, closing the security gaps that enable these cyberthreats to access systems should be a priority for …

woman
Paving the way for women in industrial cybersecurity research

The professional journey an individual takes is heavily influenced by the people they are surrounded with throughout their life. From an early age, I knew I wanted to study …

threat modeling
79% of organizations identify threat modeling as a top priority in 2021

Security Compass published the results of a report designed to provide a better understanding of the current state of threat modeling in mid-sized, $100M to $999M and large …

healthcare
Health insurers facing growing risk of customer data theft

The U.S. health insurance industry is facing growing risks from cybersecurity threats due to the increasingly sophisticated techniques used by cybercriminals amid the …

target
IT, healthcare and manufacturing top targets for cyberattacks

Avanan announced the release of a report which analyzes today’s threat landscape, phishing vectors, and industry-based attacks, exposing healthcare and manufacturing as two of …

data
IT decision-makers doubt current data architectures will meet future model inferencing requirements

As companies look to expand their use of artificial intelligence (AI) and machine learning (ML) to keep up with the demands of their customers, they are facing hurdles getting …

week in review
Week in review: How to improve your AD security posture, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news and articles: July 2021 Patch Tuesday forecast: Don’t wait for Patch Tuesday There’s been lots of …

bulb
Three security lessons from a year of crisis

Crime thrives in a crisis, and the coronavirus was the largest collective emergency that the world has faced for decades. While there are more heroes than villains in the …

tunnel
What you need to know about transatlantic data transfers

Where does data live and who can access it? This seemingly simple question is, in fact, incredibly complex in the cloud era, as servers often reside abroad and regional data …

identity theft
Fraudulent content has a direct impact on consumer loyalty

Scams accounted for 59% of blocked user-generated malicious content during the first quarter of the year, according to a Sift report. The report examines how weaponized …

cloud
85% of organizations are yet to hit the cloud native technologies adoption milestone

Despite high adoption rates of cloud native technologies in recent years, enterprises have yet to cross the chasm to full adoption, but they’re quickly moving in that …

search
File security violations within organizations have spiked 134% as the world reopened for business

BetterCloud surveyed more than 500 IT and security professionals—and examined internal data from thousands of organizations and users—to understand their top challenges, …

Don't miss

Cybersecurity news