
5G infrastructure market estimated to reach $44.9 billion by 2025
Post COVID-19, the 5G infrastructure market is estimated to grow from $12.6 billion in 2020 and projected to reach $44.9 billion by 2025, at a CAGR of 28.97%, according to …

CISSP online self-paced training only $561 for a limited time
Is achieving the CISSP one of your 2020 goals? (ISC)² is here to help you stay on track to achieving your CISSP certification. For a limited time, get Official (ISC)² CISSP …

Week in review: API security basics, the future of infosec conferences, Sophos firewalls under attack
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Is the future of information security and tech conferences virtual? While …

Growth of APIs for new services
This is the second of a series of articles that introduces and explains API security threats, challenges, and solutions for participants in software development, operations, …

Mitigating cybersecurity risks for employees working remotely
Many IT specialists are supporting fully remote teams for the first time ever, so it’s important for everyone to operate with the same caution (if not more) than they would if …

New infosec products of the week: May 1, 2020
Guardicore Infection Monkey now maps its actions to MITRE ATT&CK knowledge base The latest version of Guardicore Infection Monkey now maps its actions to the MITRE …

Surge in phishing attacks using legitimate reCAPTCHA walls
Cyber scammers are starting to use legitimate reCAPTCHA walls to disguise malicious content from email security systems, Barracuda Networks has observed. The reCAPTCHA walls …

What’s happening with all things cloud: Existing and future cloud strategies
Cloud spend exceeds budgets as organizations expect increased cloud use due to COVID-19, according to a Flexera report. “With employees working from home and more business …

Google announces cull of low-quality, misleading Chrome extensions
With Google Chrome being by far the most widely used web browser, Google must constantly tweak protections, rules and policies to keep malicious, unhelpful and otherwise …

How to thwart human-operated ransomware campaigns?
Most ransomware campaigns hitting healthcare organizations and critical services right now are just the final act of a months-long compromise. “Using an attack pattern …

As companies rely on digital revenue, the need for web and mobile app security skyrockets
As non-essential businesses have been forced to shut their doors around the world, many companies that previously relied heavily on the brick-and-mortar side of the business …

Keeping your app’s secrets secret
The software development process has vastly changed in this past decade. Thanks to the relentless efforts of the cloud and virtualization technology providers, we now have …
Featured news
Resources
Don't miss
- March 2025 Patch Tuesday forecast: A return to normalcy
- Hetty: Open-source HTTP toolkit for security research
- How to safely dispose of old tech without leaving a security risk
- Who’s in your digital house? The truth about third-party access
- Can AI-powered gamified simulations help cybersecurity teams keep up?