Please turn on your JavaScript for this page to function normally.
Panorays CISO guide
The CISO’s Guide to Third-Party Security Management

The CISO’s Guide to Third-Party Security Management provides the instructions you need to make your organization’s third-party security program effective and …

Google Security
Google aims to improve security of browser engines, third-party Android devices and apps on Google Play

Google has announced two new security initiatives: one is aimed at helping bug hunters improve the security of various browsers’ JavaScript engines, the other at helping …

nmap
Nmap 7.90 released: New fingerprints, NSE scripts, and Npcap 1.0.0

Over a year has passed since Nmap had last been updated, but this weekend Gordon “Fyodor” Lyon announced Nmap 7.90. About Nmap Nmap is a widely used free and …

lock
Why developing cybersecurity education is key for a more secure future

Cybersecurity threats are growing every day, be they are aimed at consumers, businesses or governments. The pandemic has shown us just how critical cybersecurity is to the …

IoT
Is IoT vital for the future success of businesses?

Vodafone Business launched a report focused on the impact IoT is having on businesses at a time when their digital capabilities are put to the test by the COVID-19 pandemic. …

Password
Why CIOs need to focus on password exposure, not expiration

The cybersecurity market is growing even in the midst of the pandemic-driven economic downturn, with spending predicted to reach $123 billion by the end of the year. While …

shopping
Preventing ecommerce fraud: A look at current trends and patterns

Forter released its Fraud Attack Index, delivering in-depth insight into the impact of COVID-19 on online buyer behavior and ecommerce fraud trends. This edition revealed …

cloud
Public cloud IT infrastructure spending exceeds that for non-cloud IT infrastructure

Vendor revenue from sales of IT infrastructure products (server, enterprise storage, and Ethernet switch) for cloud environments, including public and private cloud, increased …

NIST
NIST crowdsourcing challenge aims to de-identify public data sets to protect individual privacy

NIST has launched a crowdsourcing challenge to spur new methods to ensure that important public safety data sets can be de-identified to protect individual privacy. The …

(ISC)²
Finish the year strong with special pricing on CISSP training thru Oct. 30

Go for CISSP certification now to achieve more in 2021 as a globally recognized cybersecurity leader. Whether you’re motivated by career advancement, higher pay or inspiring a …

complex
Week in review: Hardware security, protecting APIs, determining the true impact of a cyber attack

Here’s an overview of some of last week’s most interesting news, reviews and articles: The biggest cyber threats organizations deal with today Microsoft has …

money
Companies that facilitate ransomware payments risk violating US sanctions

Companies that ransomware-hit US organizations hire to facilitate the paying of the ransom are at risk of breaking US sanctions, falling afoul of the US Department of the …

Don't miss

Cybersecurity news