Please turn on your JavaScript for this page to function normally.
shield
How to increase cyber defense agility for the next lockdown

If this worldwide lockdown has taught us anything, it’s that we’re not nearly agile enough and we really need to prepare for future scenarios. Whether the next lockdown comes …

DevOps
Financial services leading the way in adopting DevOps, still hurdles remain

Businesses in financial services are ahead of the government sector in adopting DevOps to increase their speed of development and free up developer time, but hurdles still …

credit card
Is the stress of card fraud worth the digital convenience?

With a growing portion of consumers having now fallen victim to card fraud, anxiety about the security of our digital accounts is spiking, according to a survey by Marqeta. …

Magento
How a favicon delivered a web credit card skimmer to victims

Cyber crooks deploying web credit card skimmers on compromised Magento websites have a new trick up their sleeve: favicons that “turn” malicious when victims visit …

Firefox
Firefox 76 delivers new password security features and security fixes

Mozilla has released Firefox 76, which comes with critical security fixes and new features related to Firefox Lockwise, the browser’s password manager/generator …

password
Passwords still widely used, despite known weaknesses

Nearly a third (29%) of organizations in Europe and the Middle East still see usernames and passwords as one of the most effective means to protect access to their IT …

success
Destination Cyberlandia: 3 keys to cyber happiness amid COVID-19

Close your eyes and imagine an optimum state of happiness. People may envision different things — a beach, a hike through the woods, a family meal — but most cybersecurity …

Windows
Shifts in device usage have large security implications

There have been rapid substantial changes in device usage trends, and the connected security implications, as businesses shifted their operations in March due to COVID-19, …

alert
Most attacks successfully infiltrate production environments without detection

While organizations continue to invest significant budget dollars in security controls and assume that this means assets are fully protected, the reality is that a majority of …

question
Software vulnerabilities sometimes first announced on social media

Software vulnerabilities are more likely to be discussed on social media before they’re revealed on a government reporting site, a practice that could pose a national …

money
Worldwide IT spending expected to decline 5.1% in 2020

Worldwide IT spending is now expected to decline 5.1% in constant currency terms during 2020 to $2.25 trillion, as the economic impact of the COVID-19 pandemic continues to …

CCSP online self-paced training
Get official CCSP online self-paced training

Looking for a new challenge? Now’s the time to prove your mastery of cloud security with the Certified Cloud Security Professional (CCSP) certification. For a limited time, …

Don't miss

Cybersecurity news