Businesses relying on data to achieve post-pandemic digital transformation goals
Frost & Sullivan’s recent analysis finds that organizations worldwide are inclined to invest in hybrid and multi-cloud information technology (IT) environments that …
54% of businesses now have a policy in place to deal with ransomware attacks
54% of businesses now have a defined policy in place to deal with ransomware attacks – whether this means paying a ransom, relying on insurance policies or refusing to pay at …
What drives SDN adoption?
U.S. enterprises are looking to software-defined networking (SDN) providers to help them increase their agility and flexibility and enable remote working after the COVID-19 …
July 2021 Patch Tuesday: Microsoft fixes 4 actively exploited bugs
On this July 2021 Patch Tuesday: Microsoft has fixed 117 CVEs, 4 of which are actively exploited Adobe has delivered security updates for Acrobat and Reader, Bridge, …
Gmail increases email security by adding support for BIMI
Organizations who deploy Domain-based Message Authentication, Reporting, and Conformance (DMARC) will, from now on, be able to increase Gmail recipients’ trust in the …
SolarWinds patches zero-day exploited in the wild (CVE-2021-35211)
SolarWinds has released an emergency patch for CVE-2021-35211, a RCE vulnerability affecting its Serv-U Managed File Transfer and Serv-U Secure FTP that is currently being …
Critical vulnerability in Schneider Electric Modicon PLCs can lead to RCE (CVE-2021-22779)
Researchers at Armis discovered an authentication bypass vulnerability (CVE-2021-22779) in Schneider Electric’s Modicon programmable logic controllers (PLCs) that can …
It takes more than MFA to beat human hacking
While multi-factor authentication (MFA) is a much-needed addition to an effective cyber defense strategy, it is by no means foolproof. In fact, no single security effort can …
How Microsoft is taking cloud-powered innovation beyond Earth with Azure Space
The space community is growing rapidly and Microsoft’s Space team is developing capabilities and services to meet its needs for extended connectivity across the world, …
Addressing the cybersecurity skills gap: Where do we go from here?
There are an estimated 3.12 million cybersecurity jobs that need to be filled – more than double the current number of workers in this field. With this drastic gap, it is …
A more dynamic approach is needed to tackle today’s evolving cybersecurity threats
For decades, the cybersecurity industry has followed a defense-in-depth strategy, which allowed organizations to designate the battlefield against bad actors at their edge …
What is the cost of an insider data breach?
As companies emerge from the pandemic, and 40% of employees are planning to switch jobs, corporate data is at risk. Files are being uploaded, shared, synced and emailed by …
Featured news
Resources
Don't miss
- Quantum threats are already active and the defense response remains fragmented
- Top must-visit companies at RSAC 2026
- Oracle issues emergency fix for pre-auth RCE in Identity Manager (CVE-2026-21992)
- Your AI agents are moving sensitive data. Do you know where?
- Plumber: Open-source scanner of GitLab CI/CD pipelines for compliance gaps