Please turn on your JavaScript for this page to function normally.
glasses
How the under 30s expect new approaches to cybersecurity

In today’s multigenerational workforce, the over-30s are more likely to adopt cybersecurity good practice than their younger colleagues who have grown up with digital …

complex
How much organizations are investing in analytics and why

Despite 94% of organizations believing data and analytics is important to their digital transformation and business growth, most are not enabling a data-driven culture, …

gamer
Targeted online messaging dissuading young gamers from getting involved in cybercrime

Highly-targeted messaging campaigns from law enforcement can be surprisingly effective at dissuading young gamers from getting involved in cybercrime, a new study has …

ThreatConnect whitepaper
Whitepaper: Make smarter decisions by using orchestration with intelligence

Analysts in security teams make decisions all day in their investigations that impact the security of the entire organization: Where should I look next? What should I do about …

Avast
Avast breached by hackers who wanted to compromise CCleaner again

Czech security software maker Avast has suffered another malicious intrusion into their networks, but the attackers didn’t accomplish what they apparently wanted: …

shield
How cybersecurity accelerates business growth

It’s no secret that the cybersecurity industry has grown exponentially over more than a decade due to the proliferation of high-profile cybercrime. Viewing cybersecurity as …

face
Deepfakes and voice as the next data breach

Deepfake technology, which uses deep learning to create fake or altered video and audio content, continues to pose a major threat to businesses, consumers, and society as a …

tools
AI and ML will become important for how organizations run their digital systems

Global organizations are making significant progress with digital transformation projects despite obstacles, however technology leaders are finding that running their …

money
Spending on security hardware, software, and services continues to increase

Worldwide spending on security products and services will enjoy solid growth over the next five years as organizations continue to invest in solutions to meet a wide range of …

Signal Sciences
Webinar: Application Protection and Performance Monitoring Using Datadog + Signal Sciences

For years, security, operations, and engineering have struggled to get one cohesive view of application performance and real-time attacks due to multiple streams of data from …

insider threat
Week in review: Insider threat essentials, tracing IP hijackers, cryptojacking worm hits Docker hosts

Here’s an overview of some of last week’s most interesting news, reviews and articles: “Smart city” governments should also be smart about security While the …

Cryptojacking worm compromised over 2,000 Docker hosts

Security researchers have discovered a cryptojacking worm that propagates using containers in the Docker Engine (Community Edition) and has spread to more than 2,000 …

Don't miss

Cybersecurity news