What is challenging secure application development?
A Censuswide report reveals the biggest security challenges that application security (AppSec) managers and software developers are facing within their organizations in …
Businesses are forced to adopt new cybersecurity measures
Eighty five percent of US and UK employers were forced to adopt new cybersecurity measures because of the COVID-19 pandemic and the shift to remote working, according to a …
Digital transformation spending to reach $2.8 trillion in 2025
Global spending on the digital transformation (DX) of business practices, products, and organizations is forecast to reach $2.8 trillion in 2025, more than double the amount …
Zoom patches vulnerabilities in its range of conferencing apps
Zoom has patched vulnerabilities in its range of local solutions for conferences, negotiations and recordings – Zoom Meeting Connector Controller, Zoom Virtual Room …
We need a Cyber Awareness Century
For a generation of people that panic if they leave home without their phone or in the event of a social media outage, we are still very unequipped to handle the internet’s …
Operational technology and zero trust
Zero trust, otherwise known as zero trust architecture (ZTA), is a shift in the way we think about security. Zero trust is the concept of centralizing policy control, limiting …
How do I select a policy automation solution for my business?
Organizations nowadays have to meet a growing number of regulatory, compliance and legal requirements. The more complex an organization is, the more time consuming these …
Shrinking cyber budgets are leaving businesses at risk
The cyber budgets of enterprises rose by less than 1% during the pandemic, according to their cyber budget holders. This left cyber spend stagnating at an average of around …
Cultural divide between IT and OT teams leaves 65% of organizations unable to secure both environments
Only 21% of organizations have achieved full maturity of their ICS/OT cybersecurity program, in which emerging threats drive priority actions and C-level executives and the …
Internal audit leaders expect new risks to emerge post-pandemic
COVID-19 stretched organizational resources and unleashed new risks on a global basis, prompting an ongoing pivot by internal audit departments to address the evolving …
5G and edge computing will lead an app development revolution
A ResearchAndMarkets report evaluates the outlook for 5G technology, infrastructure, devices, applications, and services. The report also assesses the technologies, …
Intel chip flaw could enable attacks on laptops, cars, medical devices (CVE-2021-0146)
Researchers uncovered a vulnerability in Intel Processors that could affect laptops, cars and embedded systems. The flaw (CVE-2021-0146) enables testing or debugging modes on …
Featured news
Resources
Don't miss
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?
- AI-driven insights transform security preparedness and recovery
- NDR’s role in a modern cybersecurity stack
- How Russian hackers went after NGOs’ WhatsApp accounts