Please turn on your JavaScript for this page to function normally.
Patch Tuesday
May 2021 Patch Tuesday: Adobe fixes exploited Reader 0-day, Microsoft patches 55 holes

On this May 2021 Patch Tuesday: Adobe has fixed a Reader flaw exploited in attacks in the wild, as well as delivered security updates for eleven other products, including …

pipeline biohazard
What the pipeline attack means for critical infrastructures

The big news in critical infrastructure security is the ransomware-triggered shutdown of the Colonial gasoline pipeline – the largest such pipeline in the USA. The …

ship
Navigating the waters of maritime cybersecurity

In January 2021, new International Maritime Organization (IMO) guidelines on maritime cyber risk management went into effect. Around the same time, the U.S. government …

biometrics
Scammers aren’t always who we expect them to be: How AI and biometrics can help

When it’s time to hire a new employee, organizations go to great lengths to avoid hiring someone who would commit fraud: background checks, credit checks, drug tests, etc. But …

Person
When the adversarial view of the attack surface is missing, DX becomes riskier

Digital transformation (DX) has become a competitive imperative in most industries. Organizations that fail to make this shift successfully – or in a timely fashion …

The Pentester Blueprint
Review: The Pentester Blueprint: Starting a Career as an Ethical Hacker

Brough to you by cybersecurity researcher Kim Crawley and pentester and author Phillip L. Wylie, The Pentester Blueprint gives insights into the most common hurdles …

crowd
Technology sector records employment growth in April

The U.S. technology sector has now recorded employment growth in each of the past five months, according to analysis by CompTIA. Technology companies added 16,600 jobs in …

security awareness
Security awareness training doesn’t solve human risk

Traditional employee risk mitigation efforts such as security awareness training and phishing simulations have a limited impact on improving employees’ real-world …

CISSP
Webcast: Get a sneak peek inside the CISSP domains

Look into the Certified Information Systems Security Professional (CISSP) official training course and walk away with a grasp of the topics covered in the CISSP Common Body of …

hunt
Why threat hunting is obsolete without context

Cybersecurity is an undisputed concern within any industry – but how are organizations and businesses using the security data and information they collect to best ensure their …

analyst
The best CISOs think like Batman, not Superman

Many CISOs see themselves as Superman — soaring overhead, cape fluttering, and ready to swoop in and save the day at a moment’s notice if a crisis arises. There have been …

bot protection
90% of security leaders view bot management as a top priority

HUMAN published a research into security leaders’ perceptions of and responses to sophisticated bot attacks. The research, which was conducted by Enterprise Strategy Group …

Don't miss

Cybersecurity news