Please turn on your JavaScript for this page to function normally.
Working from home
The everywhere workplace is here to stay

63% of respondents said they would rather work remotely than be promoted, and 48% said they would take a pay cut in exchange to be able to work from anywhere, an Ivanti survey …

Kali Linux 2021.2
Kali Linux 2021.2 released: Kaboxer, Kali-Tweaks, new tools, and more!

Offensive Security has released Kali Linux 2021.2, the latest version of its popular open source penetration testing platform. You can download it or upgrade to it. Kali Linux …

Good
The power of positive reinforcement in combating cybercriminals

Funnily enough, humans aren’t too different from dogs when it comes to changing a behavior for the better. One of the most powerful leadership tools is positive …

target
The most important point in a cyberattack is before it happens

Let’s get the scary thing out of the way: more than half of businesses have dealt with a serious security breach in the last two years. The chances of one happening are so …

Adapting the network for a remote working future

In the wake of the 2008 financial crisis, there was a big emphasis on stress testing major banks to determine if they have the reserves and processes to withstand such an …

Interpol
Operation HAECHI-I intercepts $83M in online financial crimes

Amid an exponential increase in online fraud, an INTERPOL-coordinated operation codenamed HAECHI-I mobilized more than 40 specialized law enforcement officers across the Asia …

AI
AI-based diagnostic processes that safeguard data privacy

Digital medicine is opening up entirely new possibilities. For example, it can detect tumors at an early stage. But the effectiveness of new AI algorithms depends on the …

CISO guide
A CISO’s Guide: Mitigating the Human Risk Factor

Security teams deploy several technologies to protect their attack vectors (network, endpoints, email, web, cloud apps, etc.). But what about the human attack surface? …

data
How do I select a data analytics solution for my business?

In today’s data driven world, an organization should have full insight into its database, not only because it is important to have control over it but also because it …

network
Cybersecurity industry analysis: Another recurring vulnerability we must correct

I have spent my career finding, fixing, discussing, and breaking down software vulnerabilities, one way or another. I know that when it comes to some common security bugs, …

Qualys CSAM
Helping security teams respond to gaps in security and compliance programs with Qualys CSAM

Unlike traditional inventory tools that focus solely on visibility or rely on third-party solutions to collect security data, Qualys CyberSecurity Asset Management (CSAM) is …

Europe
EUCC receives first EU cybersecurity certification scheme

In July 2019, the EUCC was the first candidate cybersecurity certification scheme request received by the EU Agency for Cybersecurity (ENISA) under the Cybersecurity Act. This …

Don't miss

Cybersecurity news