
DNS security is no longer optional
Several high-profile DNS security incidents have made headlines recently, a reminder that this integral part of the internet must not be taken for granted. Unlike enterprise …

FSI organizations are failing to assess their software for security vulnerabilities before release
More than half of organizations have experienced theft of sensitive customer data or system failure and downtime because of insecure software or technology, a Synopsys report …

The persistent struggle to improve SOC productivity reveals the need for newer SIEM technologies
On average, security personnel in U.S. enterprises waste approximately 25 percent of their time chasing false positives because security alerts or indicators of compromise …

As attackers get more creative, mobile threats and attacks increase in both quantity and impact
It is no longer a matter of if or when an enterprise’s mobile endpoints will be compromised. They already are and most organizations have little to no knowledge or visibility …

Public cloud data continues to grow, headed toward $500 billion by 2023
The worldwide public cloud services market grew 27.4% year over year in 2018 with revenues totaling nearly $183 billion, according to IDC. This growth rate, which is more than …

Whitepaper – Threat Intelligence Platforms: Open Source vs. Commercial
As a member of a maturing security team evaluating threat intelligence platforms (TIPs), you may be asking yourself whether you should use an open source solution like Malware …

Week in review: Capital One breach, Visa payment limit bypass flaw, VxWorks RTOS vulnerabilities
Here’s an overview of some of last week’s most interesting news, interviews and articles: The dynamic of modern security challenges: Issues security leaders face …

US utilities targeted with spear-phishing emails impersonating engineering licensing board
If you worked in a US company in the utilities sector and received an email notification telling you that you’ve failed your “Fundamentals of Engineering” …

Five examples of user-centered bank fraud
In today’s digital-first world, banks and financial service companies need to allow their customers to easily manage money online in order to compete. Unfortunately, most …

Research shows that devices banned by US government lack basic security practices
As the August 13 deadline looms for the US ban on Chinese surveillance cameras, the news cycle is re-engaged with the issue. The panic about banned cameras still being in …

New infosec products of the week: August 2, 2019
Qualys is making its Global IT Asset Discovery and Inventory app available to all businesses for free Qualys is making its Global IT Asset Discovery and Inventory app …

Most interesting trends on cloud service and web usage
Cloud services account for 85% of all enterprise web traffic, signaling a need for enterprises to adopt a holistic approach to securing the cloud and web, a Netskope Cloud …
Featured news
Resources
Don't miss
- IntelMQ: Open-source tool for collecting and processing security feeds
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry