Please turn on your JavaScript for this page to function normally.
open source
Enterprises increasingly relying on open source software

Enterprises have a deep appreciation for the value of open source software with 100% of the information technology (IT) decision-makers in a recent survey saying that “using …

connected car
CAM sector cybersecurity challenges and how to mitigate them

ENISA discloses an in-depth analysis of the cybersecurity challenges faced by the connected and automated mobility (CAM) sector and provides actionable recommendations to …

organize
Top concerns for IT leaders planning for hybrid workplace environments

Employee engagement (56%), burnout (53%), and reduced productivity (52%) are top concerns for IT leaders in 2021 and beyond, as they continue to enable remote workers and plan …

managed cybersecurity
How do I select a managed cybersecurity solution for my business?

Digital transformation has been around for a while, but last year it accelerated its pace significantly. As organizations suddenly shifted to an almost exclusively digital …

idea
A picture is worth a thousand words, but to hackers, it’s worth much more

Enterprises and end-users are constantly reminded of the dangers associated with clicking on unknown links and documents. Images rarely top the list as would-be …

phishing
Exploiting common URL redirection methods to create effective phishing attacks

“Simple” can often be harder than “complex.” When thinking about the trickiest phishing campaigns and their components, URL redirection does not immediately come to mind as …

Windows
Defending against Windows RDP attacks

In 2020, attacks against Windows Remote Desktop Protocol (RDP) grew by 768%, according to ESET. But this shouldn’t come as a surprise, given the massive increase in the number …

Bitcoin
Bitcoin Security Rectifier app aims to make Bitcoin more secure

A computer science engineer at Michigan State University has a word of advice for the millions of bitcoin owners who use smartphone apps to manage their cryptocurrency: …

digital transformation
DX projects hindered by lack of collaboration between security and networking teams

Netskope revealed a research showing a significant breakdown in collaboration between two of the central components of the IT team: networking and security. While 49% of …

idea
Getting a grip on basic cyber hygiene

We know that good “hygiene” is conducive to good health and cleanliness. And, if you’re reading this blog it’s safe to say that you’re familiar with the term “cyber” as it …

Cynet CISO Challenge
New competition allows cybersecurity leaders to test their knowledge and skills

What can security leaders do to make sure they’re prepared and hone their skills ahead of the next inevitable threat? Now, they can test themselves and their knowledge at a …

week in review
Week in review: Patch Tuesday forecast, how to select a DLP solution, is it OK to publish PoC exploits?

Here’s an overview of some of last week’s most interesting news, articles and interviews: 21 vulnerabilities found in Exim, update your instances ASAP! A code audit of Exim, a …

Don't miss

Cybersecurity news