Please turn on your JavaScript for this page to function normally.
danger
Ransomware perspectives: The shape of things to come

Michael Hamilton, CISO of CI Security, has worked in the information security industry for 30 years. As former CISO for the City of Seattle, he managed information security …

voice
New technique protects consumers from voice spoofing attacks

Researchers from CSIRO’s Data61 have developed a new technique to protect consumers from voice spoofing attacks. Fraudsters can record a person’s voice for voice …

laptop
How to protect remote workers from phishing and other attacks

Working from home is a new ‘norm’ for many organizations, but the shift toward remote work has been steadily increasing for the past decade. In fact, between 1996 and 2016 …

tools
Fixing all vulnerabilities is unrealistic, you need to zero in on what matters

As technology constantly advances, software development teams are bombarded with security alerts at an increasing rate. This has made it nearly impossible to remediate every …

person
Consumer security concerns at an all-time high, but priorities have shifted

31% of Americans are concerned about their data security while working from home during the global health crisis, according to a Unisys Security survey. Consumer security …

mobile security
How do I select a mobile security solution for my business?

The percentage of companies admitting to suffering a mobile-related compromise has grown, despite a higher percentage of organizations deciding not to sacrifice the security …

communication
5 cybersecurity considerations for getting back to work securely

As governments begin lifting emergency orders, company leaders are considering policies, technology and processes that will protect their workforces. Many of these factors …

climb
Cyber readiness has improved, but potential blind spots remain

Businesses are enhancing levels of spending and activity to minimize their vulnerability to cyber incidents and breaches, according to Hiscox. The annual Hiscox Cyber …

laptop
Employees are worried about cyber threats in their home office environments

IBM Security released findings from a study focused on the behaviors and security risks of those new to working from home (WFH) during the COVID-19 pandemic. Cyber threats in …

architecture
Business functions fail to collaborate on digitization

Many companies do not realize the full value of investing in digital projects due to a lack of collaboration among their critical business functions, according to a study by …

email
Guide: How to assess your email vulnerability for free in 20 minutes

This guide is no longer available. Attacks delivered via email are extremely common and the fact is that many popular security solutions are just not handling these attacks …

shield
How to secure software in a DevOps world

The COVID-19 pandemic and its impact on the world has made a growing number of people realize how many of our everyday activities depend on software. We increasingly work, …

Don't miss

Cybersecurity news