Please turn on your JavaScript for this page to function normally.
tracking
Vulnerability in popular browsers could be used to track, profile users online

A vulnerability affecting desktop versions of four popular web browsers could be exploited by advertisers, malicious actors, and other third parties to track and profile users …

ransomware
Dealing with ransomware attacks: What options do you have?

IT decision-makers often find themselves stuck between a rock and a hard place when it comes to dealing with ransomware attacks. Do they pay a large sum of money to …

esignature
How do I select an eSignature solution for my business?

The popularity of eSignature solutions has skyrocketed in the last year, as part of companies’ digital transformation efforts in the COVID-19 environment. Organizations …

search
Cyber investigations, threat hunting and research: More art than science

While it’s true that threat hunting, incident response, and threat research all have their foundations in science (operating system theory and architecture, computer language …

gap
85% of breaches involve the human element

The 2021 Verizon Data Breach Investigations Report (DBIR) examines more breaches than ever before, and sheds light on how the most common forms of cyber attacks affected the …

cloud
Most organizations fail to fix cloud misconfiguration issues in a timely manner

A significant majority of companies that move to multi-cloud environments are not properly configuring their cloud-based services, Aqua Security reveals. According to the …

mind map
How prepared is the intelligence community to tackle possible threats?

Human psychology is complex. It’s a dynamic and sometimes contradictory system. Compounding this problem is the rapid progress of technology and social media, toppling …

cloud
Privacy regulations making cloud migration complex

Digital transformation is driving multi-cloud migrations, as 85 percent of organizations use at least two cloud providers for data storage and analytics, while 40 percent use …

week in review
Week in review: Top security threats for power plants, defending against Windows RDP attacks

Here’s an overview of some of last week’s most interesting news and articles: Why threat hunting is obsolete without context Threat hunting is one of the more recent …

infosec products of the week
New infosec products of the week: May 14, 2021

Elevate Security unveils human attack surface management platform Pioneering a new category in cybersecurity, human attack surface management, the Elevate Security Platform …

WAF
DevOps didn’t kill WAF, because WAF will never truly die

The web application firewall (WAF) is dead, they say, and DevOps is the culprit, found over the body in the server room with a blade in its hand and splattered code on its …

backup
Maximizing a hybrid cloud approach with colocation

As a multi-tenant cloud environment, the public cloud offers companies with vast amounts of data a highly affordable option. However, it also presents a number of limitations …

Don't miss

Cybersecurity news