Alert overload still plagues cybersecurity industry
Alert overload still plagues the cybersecurity industry, according to Critical Start. Forty-seven percent of respondents reported personally investigating 10 to 20 alerts each …
Defending enterprise systems during a pandemic
A new report from Akamai looks back at 2020, examining some of the technological shifts and the patterns that emerged from lockdown-related internet spikes at the beginning of …
The impact of the pandemic on digital transformation and data access
Data access has become more critical for 53% of survey respondents throughout the pandemic as analytics workloads and demands increase significantly, according to a survey …
How to mitigate security risks as cloud services adoption spikes
Millions have flocked to video-conferencing solutions and organizations have relied more heavily on various applications (such as G Suite for end users, Azure for developers, …
2021 Hacker Report: Hackers are not just driven by money
HackerOne released its 2021 Hacker Report that reveals a 63% increase in the number of hackers submitting vulnerabilities in 2020. As organizations’ attack surfaces have …
372% increase in healthcare bot traffic could tamper with booking vaccine dates
Nations around the world are racing to acquire COVID-19 vaccines and assemble digital infrastructure and web applications to enable appointment booking. As they do this, …
Most decision makers plan to increase spending on cybersecurity this year
Budget cuts, redundancies, delays to cyber resilience projects and increased remote working in the last 12 months could all have increased organizations’ risk of a cyber …
Rapid digital transformation makes an application strategy a business imperative
Companies have significantly sped up their digital transformation efforts in the past year, a theme anticipated to persist beyond the pandemic, according to F5. With limited …
March 2021 Patch Tuesday: Microsoft fixes yet another actively exploited IE zero-day
As system administrators and security teams around the world are working on ascertaining whether they’ve been breached and compromised via vulnerable Microsoft Exchange …
Keeping your serverless architecture secure
Serverless architecture empowers organizations to build and deploy software at scale without in-house servers. The prevalence of Function-as-a-Service (FaaS) models like …
A great deal of employees have inappropriate access to sensitive data
The onset of COVID-19 and resulting distributed workforce have introduced new and complex challenges for businesses, with 45% of IT decision-makers reporting increased …
49% of female cybersecurity pros say the pandemic had a positive impact on their career
While the global job market has been hit hard by the pandemic, cybersecurity job recruitment thrived in 2020. According to a new global report from Tessian, 94% of security …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades