Please turn on your JavaScript for this page to function normally.
Phishing
Microsoft demystifies email attack campaigns targeting organizations

Email is attackers’ preferred method for gaining a foothold into organizations. Campaign views, a new type of report available to some Microsoft enterprise customers, …

bomb
The 7 most dangerous digital technology trends

As our world embraces a digital transformation, innovative technologies bring greater opportunities, cost efficiencies, abilities to scale globally, and entirely new service …

hand
It’s the most vulnerable time of the year

With the holiday season upon us, it can be all too easy to get swept up in the festivities. As soon as the Halloween hangover starts to finally wear off, you’re already …

identity
What are the qualities of a good digital identity management program?

Growing consumer expectations, the breakdown of traditional “walls” and emerging technologies are making it hard for organizations to devise a successful digital identity …

BYOD
BYOD security challenges leave companies at risk

Organizations aren’t moving quickly enough on cybersecurity threats linked to the drive toward using personal mobile devices in the workplace, warns a QUT privacy …

servers
Server market revenue declines 6.7% year over year

Vendor revenue in the worldwide server market declined 6.7% year over year to $22.0 billion during the third quarter of 2019 (3Q19), according to IDC. Worldwide server …

Microsoft impersonate
Compromised passwords used on 44 million Microsoft accounts

44 million Microsoft Azure AD and Microsoft Services accounts were vulnerable to account hijacking due to use of compromised passwords, Microsoft has shared. The discovery was …

(IN)SECURE 64
(IN)SECURE Magazine issue 64 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 64 has been released today. It’s a free …

eye
Top 5 cybersecurity predictions for 2020

When it comes to cybersecurity, staying ahead of threats – rather than reacting to them – is critical. In a constantly evolving threat landscape, plugging holes – or designing …

Network
DNS over HTTPS’ threat to enterprise security

DNS over HTTPS (DoH) is here, regardless who likes it or not. Unfortunately, a majority of guidance surrounding DoH is centered around individual consumer perspectives. For …

lock
Key security priorities for financial services: Preventing fraud and data leaks

The banking and financial services sector is struggling with a skills shortage along with the sheer volume of threats and alerts as it continues its ongoing battle against …

cloud
Most enterprises hit cloud migration problems, still run apps on legacy operating systems

More than nine out of 10 of US enterprises in the Dow Jones, Fortune 250 and 500, and S&P 100 have run into cloud migration problems when it comes to moving legacy …

Don't miss

Cybersecurity news