
RIP guest access, long live shared channels!
While many yearn to return to pre-pandemic days, some aspects of our new normal are welcome. Most notable is the flexibility of hybrid working, with a great majority of …

How to build a zero-trust cloud data architecture
Cloud computing has had a profound impact on CISOs. They realize its cheap storage, immense scalability, resource elasticity and accessibility from anywhere in the world, at …

Blocked DDoS attack volumes up, tech, healthcare and finance most targeted
Second quarter blocked DDoS attack volumes were up more than 40% compared to the same period in 2020, a Radware report reveals. The report provides an overview of DDoS attack …

Cybercriminals are manipulating reality to reshape the modern threat landscape
VMware released a report which analyzes how cybercriminals are manipulating reality to reshape the modern threat landscape. The report found a drastic rise in destructive …

Ineffective software delivery costing businesses up to $126 million per year
Businesses may be sacrificing up to $126 million in revenue per year due to ineffective software delivery, according to a CircleCI study. Surveying more than 2,000 business …

5G infrastructure market size to reach $80.5 billion by 2028
The global 5G infrastructure market size is expected to reach $80.5 billion by 2028, according to a study by Grand View Research. It is expected to expand at a CAGR of 49.8% …

SAP S/4HANA adoption rebounds as enterprises look to minimize business disruption
U.S. adoption of SAP S/4HANA has rebounded after slowing for most of 2020 as the COVID-19 pandemic stalled digital transformations, according to a report published by …

Vulnerable TCP/IP stack is used by almost 200 device vendors
Researchers have discovered 14 new vulnerabilities affecting the proprietary NicheStack (aka InterNiche) TCP/IP stack, used in OT devices such as the extremely popular Siemens …

A clever phishing campaign is targeting Office 365 users
Microsoft is warning about an ongoing, “sneakier than usual” phishing campaign aimed at Office 365 users. An active phishing campaign is using a crafty combination …

Are you ready for the CISSP exam?
Find out with the Official (ISC)² CISSP Flash Cards. Study for the CISSP exam anytime, anywhere using this FREE interactive self-study tool that tests knowledge across all …

Review: Group-IB Digital Risk Protection
The COVID-19 pandemic has transformed our private and working lives. It has also forced companies to extend the network perimeter due to employees working from their homes and …

AWS S3 can be a security risk for your business
Along with the shift to the cloud and emergence of modern digital services and applications, new security concerns have emerged for organizations. More connectivity means more …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground