Please turn on your JavaScript for this page to function normally.
COVID-19
372% increase in healthcare bot traffic could tamper with booking vaccine dates

Nations around the world are racing to acquire COVID-19 vaccines and assemble digital infrastructure and web applications to enable appointment booking. As they do this, …

smart cybersecurity spending
Most decision makers plan to increase spending on cybersecurity this year

Budget cuts, redundancies, delays to cyber resilience projects and increased remote working in the last 12 months could all have increased organizations’ risk of a cyber …

building
Rapid digital transformation makes an application strategy a business imperative

Companies have significantly sped up their digital transformation efforts in the past year, a theme anticipated to persist beyond the pandemic, according to F5. With limited …

Patch Tuesday
March 2021 Patch Tuesday: Microsoft fixes yet another actively exploited IE zero-day

As system administrators and security teams around the world are working on ascertaining whether they’ve been breached and compromised via vulnerable Microsoft Exchange …

tunnel
Keeping your serverless architecture secure

Serverless architecture empowers organizations to build and deploy software at scale without in-house servers. The prevalence of Function-as-a-Service (FaaS) models like …

Hands
A great deal of employees have inappropriate access to sensitive data

The onset of COVID-19 and resulting distributed workforce have introduced new and complex challenges for businesses, with 45% of IT decision-makers reporting increased …

woman
49% of female cybersecurity pros say the pandemic had a positive impact on their career

While the global job market has been hit hard by the pandemic, cybersecurity job recruitment thrived in 2020. According to a new global report from Tessian, 94% of security …

SASE
Only 12% of enterprises have fully embraced SASE

Although many public and private sector organizations have elements of SASE in their IT stack, only 12% worldwide currently have a comprehensive SASE architecture, according …

5G
5G slicing will generate $20 billion in revenue

5G slicing is a crucial enabler of new business models and a key concept to empower the potential of 5G. Communications Service Providers (CSPs) can slice their network assets …

Active Directory
eBook: Protecting Active Directory

Microsoft Active Directory (AD) is ubiquitous across the corporate landscape and a perfect target for cyberattacks due to its popularity and importance. A single set of …

SOAR
How do I select a SOAR solution for my business?

Security Orchestration, Automation and Response (SOAR) products offer an appealing solution, promising efficiencies in detecting and responding to threats. However, …

security awareness
Security awareness programs: The difference between window dressing and behavior change

CISOs are responsible for pursuing cybersecurity purchases that align with the overall health of their organizations. All investments must drive tangible value and ROI while …

Don't miss

Cybersecurity news