Please turn on your JavaScript for this page to function normally.
sharing
The cybersecurity labor crunch highlights gaps in threat intelligence practices

In Greek mythology, Sisyphus, the King of Corinth, was punished by Hades by being forced to roll a huge stone up a hill, only to have it roll down again as soon as he reached …

identity theft
The privacy and security trends that will shape 2020

Privacy concerns will ratchet up further around IoT and 5G. Even if the industry manages to secure the billions of IoT devices already deployed, they permeate so many aspects …

broken
Most security pros admit to accidental internal breaches at their organization

44% percent of executives believe employees have erroneously exposed personally identifiable information (PII) or business-sensitive information using their company email …

DevOps
Most DevOps pros feel proper certificate issuance policies slow them down

75% of DevOps professionals are concerned that policies for issuing certificates slow down development, and over a third (39%) believe developers should be able to circumvent …

person
New account fraud has more than doubled since 2014

New account fraud increased 27.8% worldwide YTD in 2019, compared to full-year 2018 results, and more than 100% compared to 2014 levels, Jumio reveals. Surprisingly, attempted …

Trend Micro oil and gas industry
Oil and gas industry risks escalate, cybersecurity should be prioritized

The oil and gas industry and its supply chain face increased cybersecurity risks from advanced threat groups and others as they continue to build out digitally connected …

people
Week in review: AD password reset best practices, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: DNS over HTTPS’ threat to enterprise security DNS over HTTPS (DoH) is here, …

fix
The importance of proactive patch management

IT teams appreciate it when vendors or security researchers discover new vulnerabilities and develop patches for them. So do attackers. The same information that lets IT teams …

IBM Cloud Identity
New infosec products of the week: December 13, 2019

IBM Security adds AI features to its Cloud Identity solution IBM Cloud Identity now features AI-based adaptive access capabilities that help continually assess employee or …

server
Will quantum computing overwhelm existing security tech in the near future?

More than half (54%) of cybersecurity professionals have expressed concerns that quantum computing will outpace the development of other security tech, according to a research …

vectors
As malware and network attacks increase in 2019, zero day malware accounts for 50% of detections

Amid significant increases in both malware and network attacks, multiple Apache Struts vulnerabilities – including one used in the devastating Equifax data breach – appeared …

SaaS
SaaS security fears: Is your data exposed to potential risk?

IT executives have rising SaaS security fears, and worry about cloud security, proprietary data encryption, as well as the loss of independent control due to access …

Don't miss

Cybersecurity news