Please turn on your JavaScript for this page to function normally.
Webinar: Practical steps to build a risk-based application security program

Your executives don’t care about security – they care about risk! Hear the latest research from a guest speaker, Sandy Carielli, Principal Forrester Analyst, on …

week in review
Week in review: ProxyShell and Realtek SDK vulnerabilities exploitation, automated pentesting

Here’s an overview of some of last week’s most interesting news, articles and interviews: Realtek SDK vulnerability exploitation attempts detected (CVE-2021-35395) …

New infosec products of the week: August 27, 2021

Here’s a look at the most interesting product releases from the past week, featuring releases from ARMO, Palo Alto Networks, Guardicore, Radiflow and Ermetic. Kubescape helps …

library
Your data, your choice

In 2021, “personal data” is anything but “personal”. We don’t own our personal data and we have limited control over what happens to it. Currently, the onus of responsibility …

Sachin Shah
Trends in the OT/ICS security space and what’s to come

In July 2021, Armis appointed Sachin Shah, an Intel veteran of over 21 years, as its new CTO for Operational Technology (OT) and Industrial Control Systems (ICS). In this …

zero
Challenges organizations face when implementing zero trust architecture

98 percent of UK business leaders and IT decision makers either plan to or have already started implementing zero trust strategies at their organizations, according to …

network
What is driving organizations to explore emerging technologies?

Engineering trust, accelerating growth and sculpting change are the three overarching trends on the Gartner Hype Cycle for Emerging Technologies, 2021 that will drive …

money
GRC solutions revenues to reach nearly $15.2 billion in 2025

Worldwide revenues for governance, risk, and compliance (GRC) software experienced healthy growth in 2020, growing 8.2% year over year, despite concerns of a market downturn …

vulnerability
Vulnerability management is facing three core problems: Here’s how to solve them

The COVID-19 pandemic has placed enormous stress on information security professionals. A threat landscape that was already growing more complex by the minute now presents an …

search
Checking for misconfigurations isn’t enough

Misconfiguration errors are often the main focus of security for cloud-native applications, and for good reason. Earlier this year, Hobby Lobby accidentally exposed 136 GB of …

Dave Wreski
How to make email safe for business

When it comes to business communication, email is still king. Cybercriminals are aware of this fact, and they’re constantly perfecting their attacks to successfully …

idea
Cybersecurity market soaring as threats target commercial and govt organizations

Over the past year, it’s been impossible to ignore the rising tide of threats targeting government and commercial organizations around the world, and the cybersecurity market …

Don't miss

Cybersecurity news