Most decision makers plan to increase spending on cybersecurity this year
Budget cuts, redundancies, delays to cyber resilience projects and increased remote working in the last 12 months could all have increased organizations’ risk of a cyber …
Rapid digital transformation makes an application strategy a business imperative
Companies have significantly sped up their digital transformation efforts in the past year, a theme anticipated to persist beyond the pandemic, according to F5. With limited …
March 2021 Patch Tuesday: Microsoft fixes yet another actively exploited IE zero-day
As system administrators and security teams around the world are working on ascertaining whether they’ve been breached and compromised via vulnerable Microsoft Exchange …
Keeping your serverless architecture secure
Serverless architecture empowers organizations to build and deploy software at scale without in-house servers. The prevalence of Function-as-a-Service (FaaS) models like …
A great deal of employees have inappropriate access to sensitive data
The onset of COVID-19 and resulting distributed workforce have introduced new and complex challenges for businesses, with 45% of IT decision-makers reporting increased …
49% of female cybersecurity pros say the pandemic had a positive impact on their career
While the global job market has been hit hard by the pandemic, cybersecurity job recruitment thrived in 2020. According to a new global report from Tessian, 94% of security …
Only 12% of enterprises have fully embraced SASE
Although many public and private sector organizations have elements of SASE in their IT stack, only 12% worldwide currently have a comprehensive SASE architecture, according …
5G slicing will generate $20 billion in revenue
5G slicing is a crucial enabler of new business models and a key concept to empower the potential of 5G. Communications Service Providers (CSPs) can slice their network assets …
eBook: Protecting Active Directory
Microsoft Active Directory (AD) is ubiquitous across the corporate landscape and a perfect target for cyberattacks due to its popularity and importance. A single set of …
How do I select a SOAR solution for my business?
Security Orchestration, Automation and Response (SOAR) products offer an appealing solution, promising efficiencies in detecting and responding to threats. However, …
Security awareness programs: The difference between window dressing and behavior change
CISOs are responsible for pursuing cybersecurity purchases that align with the overall health of their organizations. All investments must drive tangible value and ROI while …
Number of ransomware attacks grew by more than 150%
By the end of 2020, the ransomware market, fueled by the pandemic turbulence, had turned into the biggest cybercrime money artery. Based on the analysis of more than 500 …
Featured news
Resources
Don't miss
- Open-source benchmark EVMbench tests how well AI agents handle smart contract exploits
- Public mobile networks are being weaponized for combat drone operations
- Attackers keep finding the same gaps in security programs
- China-linked hackers exploited Dell zero-day since 2024 (CVE-2026-22769)
- The era of the Digital Parasite: Why stealth has replaced ransomware