Please turn on your JavaScript for this page to function normally.
NIST JTAG
Scientists test forensic methods to acquire data from damaged mobile phones

Criminals sometimes damage their mobile phones in an attempt to destroy data. They might smash, shoot, submerge or cook their phones, but forensics experts can often retrieve …

laptop
Automation is advancing faster than the enterprise knowledge required to support it

Automation is transforming the enterprise around the globe, directly impacting the bottom line as a result of improved productivity and efficiency, according to UiPath. But …

virus
Wuhan coronavirus exploited to deliver malware, phishing, hoaxes

The Wuhan coronavirus continues to spread and create anxiety across the globe, allowing malicious individuals and groups to exploit the situation to spread fake news, malware …

email
Layering diverse defenses is crucial for stopping email attacks

Despite heading a company that provides a technological solution for stopping targeted email attacks, Evan Reiser, CEO of Abnormal Security, knows that technology is not the …

EU
The current landscape for supporting innovation in cybersecurity in the EU

Innovation in cybersecurity is a key enabler to facilitate progress in the NIS industry, boost employment in the cybersecurity sector and growth of EU GDP. ENISA published a …

Network
Interconnectivity and networking predictions for 2020 and beyond

Traditional networking and interconnectivity approaches are not handling the pressures being placed on traditional computer networking, according to Stateless. The challenges …

glasses
Do your employees feel valued? 64% have one foot out the door

The estimated current cybersecurity workforce is 2.8 million professionals, while the amount of additional trained staff needed to close the skills gap is 4.07 million …

eSentire report
Now available: eSentire’s 2019 Annual Threat Intelligence Report

Recently released, eSentire’s 2019 Threat Intelligence Report: Perspectives from 2019 and Predictions for 2020 provides visuals, data and written analysis, as well as …

Hand
Week in review: UN hacked, new Kali Linux release, Win7 upgrade dilemma

Here’s an overview of some of last week’s most interesting news and articles: Kali Linux 2020.1 released: New tools, Kali NetHunter rootless, and more! Offensive …

Google OpenSK
Make your own security key with Google’s OpenSK

Google has open-sourced OpenSK, firmware that, combined with an affordable chip dongle, allows you to make your own security key to use for authentication purposes. About …

Xbox
Microsoft invites gamers and researchers to new Xbox bug bounty program

Gamers, security researchers, and technologists have been invited to identify security vulnerabilities in Xbox network and services and report them to Microsoft. Bounty …

Swimlane
New infosec products of the week: January 31, 2020

Swimlane 10.0: Reducing mean time to detect and response for security incidents The newest release has yielded up to 35X performance improvement in alarm ingestion rates and …

Don't miss

Cybersecurity news