Please turn on your JavaScript for this page to function normally.
CISSP online self-paced training
CISSP online self-paced training only $561 for a limited time

Is achieving the CISSP one of your 2020 goals? (ISC)² is here to help you stay on track to achieving your CISSP certification. For a limited time, get Official (ISC)² CISSP …

RSA Conference
Week in review: API security basics, the future of infosec conferences, Sophos firewalls under attack

Here’s an overview of some of last week’s most interesting news, articles and podcasts: Is the future of information security and tech conferences virtual? While …

Keyboard
Growth of APIs for new services

This is the second of a series of articles that introduces and explains API security threats, challenges, and solutions for participants in software development, operations, …

lock
Mitigating cybersecurity risks for employees working remotely

Many IT specialists are supporting fully remote teams for the first time ever, so it’s important for everyone to operate with the same caution (if not more) than they would if …

Datadog Security Monitoring
New infosec products of the week: May 1, 2020

Guardicore Infection Monkey now maps its actions to MITRE ATT&CK knowledge base The latest version of Guardicore Infection Monkey now maps its actions to the MITRE …

reCAPTCHA
Surge in phishing attacks using legitimate reCAPTCHA walls

Cyber scammers are starting to use legitimate reCAPTCHA walls to disguise malicious content from email security systems, Barracuda Networks has observed. The reCAPTCHA walls …

cloud
What’s happening with all things cloud: Existing and future cloud strategies

Cloud spend exceeds budgets as organizations expect increased cloud use due to COVID-19, according to a Flexera report. “With employees working from home and more business …

Google Chrome
Google announces cull of low-quality, misleading Chrome extensions

With Google Chrome being by far the most widely used web browser, Google must constantly tweak protections, rules and policies to keep malicious, unhelpful and otherwise …

ransomware
How to thwart human-operated ransomware campaigns?

Most ransomware campaigns hitting healthcare organizations and critical services right now are just the final act of a months-long compromise. “Using an attack pattern …

Good
As companies rely on digital revenue, the need for web and mobile app security skyrockets

As non-essential businesses have been forced to shut their doors around the world, many companies that previously relied heavily on the brick-and-mortar side of the business …

application
Keeping your app’s secrets secret

The software development process has vastly changed in this past decade. Thanks to the relentless efforts of the cloud and virtualization technology providers, we now have …

email
Suspicious business emails increase, imposters pretend to be executives

U.S. small businesses report an increase in suspicious business emails over the past year, a cyber survey by HSB shows, and employees are taking the bait as they fall for …

Don't miss

Cybersecurity news