Please turn on your JavaScript for this page to function normally.
money
Leveraging automation to maximize security budgets

With the economic impact of COVID-19 increasingly looking like an imminent recession and the way we do work altered perhaps forever, CIOs and CISOs will most likely be …

phishing
Are you sure you would never fall for a phishing scam?

We believe we are less likely than others are to fall for phishing scams, thereby underestimating our own exposure to risk, a cybersecurity study has found. The research also …

measure
FIRST releases updated coordination principles for Multi-Party Vulnerability Coordination and Disclosure

The Forum of Incident Response and Security Teams (FIRST) has released an updated set of coordination principles – Guidelines for Multi-Party Vulnerability Coordination and …

ransomware
Ransomware on the rise, companies prioritizing disaster recovery

The rampant rise of ransomware persists, with 100% of respondents – who include ITOps, backup, disaster recovery and storage admins, application and workload owners in the …

identity
Biometric device shipments revenue to drop by $2 billion

The pandemic is expected to cause a significant pushback on biometric device shipments, creating a major revenue drop of $2 billion over the course of 2020, according to ABI …

StellarGraph
Open source algorithms for network graph analysis help discover patterns in data

StellarGraph has launched a series of new algorithms for network graph analysis to help discover patterns in data, work with larger data sets and speed up performance while …

password
Week in review: Password psychology, SaltStack Salt vulnerabilities exploited, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles and podcasts: SaltStack Salt vulnerabilities actively exploited by attackers, patch ASAP! …

biohazard
H2 2019: Duration of phishing attacks grows, use of banking trojans wanes

The lifespan of phishing attacks in H2 2019 has grown considerably and resulted in the tremendous increase in the number of phishing websites blockages, says Group-IB’s …

GitHub Code Scanning
GitHub Code Scanning aims to prevent vulnerabilities in open source software

GitHub has made available two new security features for open and private repositories: code scanning (as a GitHub-native experience) and secret scanning (both still in beta). …

risk
The new cyber risk reality of COVID-19 operating mode

There’s little, if any, precedent for the time we’re experiencing right now with a pandemic changing the corporate landscape in profound ways. But while many are reacting in …

lock
99% of enterprise users reuse passwords across accounts

Very few users take appropriate action to significantly reduce the risk of password compromise, according to a Balbix report. The study found that more than 99% of enterprise …

shield
How to increase cyber defense agility for the next lockdown

If this worldwide lockdown has taught us anything, it’s that we’re not nearly agile enough and we really need to prepare for future scenarios. Whether the next lockdown comes …

Don't miss

Cybersecurity news