Please turn on your JavaScript for this page to function normally.
market
Key 2019 cybersecurity industry trends

Momentum Cyber revealed the most significant trends that will drive strategic activity in the cybersecurity industry in 2019 and will be prevalent themes at the RSA …

Broken glass
If an organization has been breached, it’s more likely to be targeted again

FireEye released the Mandiant M-Trends 2019 report at the RSA Conference. The report shares statistics and insights gleaned from Mandiant investigations around the globe in …

phishing
Phishers shift efforts to attack SaaS and webmail services

There was some good news and some bad news for the Internet-using public in early 2019. The good news is that the total number of conventional, spam-based phishing campaigns …

Danger
How malware traverses your network without you knowing about it

A research report has been released which, based on observed attack data over the second half of 2018 (2H 2018), reveals the command-and-control and lateral activities of …

DevSecOps
The patterns of elite DevSecOps practices

As DevOps practices are maturing rapidly, organizations with elite DevSecOps programs are automating security earlier in the development lifecycle and managing software supply …

Cloud
Worldwide spending on public cloud services and infrastructure to increase 23.8% over 2018

Worldwide spending on public cloud services and infrastructure is forecast to reach $210 billion in 2019, an increase of 23.8% over 2018. Although annual spending growth is …

programmer
Traditional cybersecurity staff retention tactics becoming less effective

The recipe for improving your organization’s ability to hire and retain cybersecurity professionals is relatively straightforward (if not easy): offer an attractive pay, …

World target
Ongoing global cyber espionage campaign broader than previously known

A detailed analysis of code and data from a command-and-control server responsible for the management of the operations, tools and tradecraft behind the Operation Sharpshooter …

CEO
Enterprise attitudes to cybersecurity: Strategies to balance risk and business acceleration

IT decision makers are facing major challenges between dynamic adversaries, significant legislation and regulation requirements, business digital transformation needs, and a …

user
Human behavior can be your biggest cybersecurity risk

Changes in user behavior are increasingly blurring the lines between personal and business. Trends like Bring Your Own Device (BYOD) and flexible working often mean that …

vectors
A strong security posture starts with application dependency mapping

More and more organizations are turning to an agile DevOps culture as part of an ongoing digital transformation to their business, moving from monolithic application …

cloud
How cloud storage providers can preempt cyber attacks with business continuity

Cloud storage is now an integral part of almost every enterprise infrastructure and, as a result, security has become one of the most crucial elements of any cloud storage …

Don't miss

Cybersecurity news