Please turn on your JavaScript for this page to function normally.
question
What’s in a cybersecurity question? Getting to the root of cyber insights

The day to day practice of cybersecurity is based around asking questions. How do I secure my applications? How do I protect my data’s integrity? How do I manage storage and …

Cyber Week
What you can expect at Cyber Week 2019

Cyber Week is a large international cybersecurity event, hosted each year at Tel Aviv University in Israel. Over the past eight years, Cyber Week has become internationally …

biohazard energy
Cyber espionage and sabotage attacks pose an increasing threat to the energy industry

Malicious actors are targeting critical infrastructure (CNI) sites and energy distribution facilities exponentially. Interconnected systems in the energy industry increase …

credit card
Banks continue to prioritize risk management over customer convenience

Almost three in four banks in Asia Pacific anticipate that fraud in their country will increase in 2019, according to a recent poll by FICO. Of specific concern are …

Outlook
Hackers used credentials of a Microsoft Support worker to access users’ webmail

On Friday, an unknown number of customers of Microsoft’s webmail services (Outlook.com, Hotmail, MSN Mail) received a notice from the company telling them that attackers …

smartphone isolation
Employee cybersecurity essentials part 2: Lost devices and unsafe connections

Security is only as strong as its weakest link, and as we have seen, that includes your employees. Faulting workers for behavior they’ve become accustomed to in their private …

risk
Bad security hygiene still a major risk for enterprise IT networks

Unpatched vulnerabilities, along with growing network and application complexity pose an ongoing security risk which could threaten the security of enterprise IT networks. …

gears
As IT security automation increases, so does the need for highly skilled staff

The adoption of automation for IT security functions is on the rise across the US, UK and APAC, the latest DomainTools/Ponemon report has shown. The report, which is based on …

cloud storage
What is driving organizations’ cloud adoption?

Cloud adoption is gaining momentum, as 36 percent of organizations are currently in the process of migrating to the cloud while close to 20 percent consider themselves to be …

G Suite
Google introduces many G Suite security enhancements

Last week, the big news from Google Cloud Next 2019 was that phones running Android 7.0 or higher can be turned into a security key for G Suite account 2-step verification. …

healthcare
Healthcare orgs have to achieve true cybersecurity, not only compliance

How many organizations in the healthcare sector are conforming with the HIPAA Security and Privacy Rules and the National Institute of Standards and Technology Cybersecurity …

face
Manufacturing sector most vulnerable to insider threats

Almost three quarters of the 650+ international IT professionals Gurucul canvassed said they are vulnerable to insider threats, and ranked user error (39%) and malicious …

Don't miss

Cybersecurity news