Week in review: 3 ways to guard against insider threats, cybersecurity posture validation
Here’s an overview of some of last week’s most interesting news, articles and interviews: Official (ISC)² CISSP CBK Reference: Out with the old, in with the new …
New infosec products of the week: October 1, 2021
Here’s a look at the most interesting product releases from the past week, featuring releases from Cloudflare, Citrix, DataDome, deepwatch, Elastic and Fugue. Elastic expands …
Today’s cars are mobile data centers, and that data needs to be protected
In a recent report, AlixPartners estimate that the global microchip shortage will cost car manufacturers $110 billion dollars in 2021, through the lost production of around …
Content sprawl is increasing the risk of data breaches and leaks
Egnyte’s latest report, based on a survey of 400 IT executives, examines the challenges of securing and governing unstructured content in today’s hybrid and remote work …
Cybercrime awareness heightened, yet people still engage in risky online behaviors
76% of Americans recognize that data breaches are serious, showing a high awareness that may be driven by news of major consumer, enterprise, and infrastructure breaches over …
How cybercrime hurts some groups more than others
Trends in cybercrime mirror the widening digital divide accelerated by the pandemic leaving lower income and vulnerable audiences disproportionally impacted. A new report by …
Evolving beyond RBAC: Why ABAC is the future
In the advent of a “work anywhere, anytime” environment, enterprises face a rapid expansion of diverse users alongside an influx of applications, devices, APIs and …
Three areas legal leaders should focus their technology efforts in
As legal and compliance teams have faced acute pressures since the global pandemic and are struggling to manage their workload, legal leaders should focus their technology …
5G connections reached 429 million in Q2 2021
Subscriber adoption of the fifth generation of wireless (5G) has increased significantly, as global wireless 5G connections for the second quarter (Q2) of 2021 reached 429 …
How much trust should we place in the security of biometric data?
An increasing number of people around the world are being displaced by factors such as climate change, natural disasters, and wars. The people attempting to cross …
Third-party risk prevention strategies inadequate despite organizations being aware of the threats
While organizations recognize third-party threats expose them to great risk, many organizations fail to take adequate measures to mitigate it. In fact, while they grapple with …
Nation-state attacks fears grow, execs don’t trust governments to protect them from cyber threats
Arctic Wolf published findings from a recent global survey of over 1,400 IT decision-makers at enterprise organizations. After a year of high-profile cyberattacks, the survey …
Featured news
Resources
Don't miss
- LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks
- Training an AI agent to attack LLM applications like a real adversary
- You don’t have to choose between BAS or automated pentesting, you shouldn’t
- Why your phishing simulations aren’t building a security culture
- Your security stack looks fine from the dashboard and that’s the problem