Protect your smartphone from radio-based attacks
By now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone …
Half of organizations are ineffective at countering phishing and ransomware threats
Half of US organizations are not effective at countering phishing and ransomware threats, Osterman Research research reveals. The findings come from a study compiled from …
How to balance employee IT security policies
Hysolate announced the release of its latest enterprise security study exploring 200 enterprise IT and security leaders’ views on enterprise priorities for ensuring secure …
Application security tools ineffective against new and growing threats
A study by Fastly and ESG, based on insights from information security and IT professionals representing hundreds of organizations globally, revealed growing concerns around …
Outsourcing cloud management driven by increasingly complex IT environments
Enterprises across the globe are turning to cloud outsourcing providers to manage their private and hybrid cloud infrastructure because of increasingly complex IT …
Worldwide AIOps market size to grow steadily by 2027
The global AIOps market size is projected to reach $23.9 billion by 2027, from $4.0 billion in 2020, at a CAGR of 30% during 2021-2027, according to Valuates Reports. Major …
Week in review: 5 popular cybersecurity exploitation techniques, new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles and interviews: (IN)SECURE Magazine issue 69 released (IN)SECURE Magazine is a free …
U.S. Government sets up ransomware task force, offers $10 million reward for info
The U.S. Government has set up a cross-agency ransomware task force, a hub for ransomware resources, and is offering $10 million for information on state-sponsored cyber …
New infosec products of the week: July 16, 2021
Mimecast CyberGraph helps detect sophisticated phishing and impersonation attacks CyberGraph creates an identity graph which is built to store information about relationships …
How to strike the balance between privacy and personalization in healthcare and beyond
The trade-off between widespread technology adoption and responsible use often lies on the spectrum of privacy. When it comes to technologies fueled by data, such as …
The rise of the Developer Experience Engineer, and why it matters
In a world that increasingly relies on digital products, software development is becoming the catalyst for value creation and achieving top-line business results. At each …
Physical threats increase as employees return to the office
As COVID-19 vaccinations continue, companies embrace hybrid work, employees return to the office and the U.S. opens up, violence and physical threats to businesses are …
Featured news
Resources
Don't miss
- Web Cache Vulnerability Scanner: Open-source tool for detecting web cache poisoning
- Funding soars in a milestone year for Israeli cybersecurity
- Stratoshark: Wireshark for the cloud – now available!
- Mirai botnet behind the largest DDoS attack to date
- 48,000+ internet-facing Fortinet firewalls still open to attack