
How to increase the efficiency of your risk and compliance management strategy
The rise of new business processes and the changing government rules and regulations around the globe are posing challenges for small and big companies alike, according to …

SD-WAN continues to be one of the fastest-growing segments of the network infrastructure market
The SD-WAN infrastructure market will grow at a 30.8% compound annual growth rate (CAGR) from 2018 to 2023 to reach $5.25 billion, according to IDC’s SD-WAN …

Week in review: Crafty Office 365 phishing, how DNS firewalls can burn security teams
Here’s an overview of some of last week’s most interesting news and articles: Phishers targeting Office 365 admins have a new trick up their sleeve Phishers …

Ransomware attack leaves Johannesburg residents without electricity
A ransomware attack aimed at City Power, the electricity provider for Johannesburg (aka Joburg), South Africa, has resulted in some residents temporarily without power. While …

Damaging insider threats rise to new highs in the past year
70 percent of organizations are more frequently seeing insider attacks, with 60 percent experiencing one or more within the last 12 months, and 68 percent feeling “extremely …

The need for scalable OT security
As manufacturers and other industrial network owners are becoming more security conscious, they are coming up against security performance issues. Operational Technology (OT) …

New infosec products of the week: July 26, 2019
Centrify unveils free cloud-based PAM offering for organizations that do not have a password vault Centrify’s Free Tier Vault is available immediately in the AWS Marketplace, …

Current methods for anonymizing data leave individuals at risk of being re-identified
With the first large fines for breaching GDPR upon us, even anonymized datasets can be traced back to individuals using machine learning, researchers from University of …

Phishing is a billion-dollar global industry, consumers are the main target
Phishing is a growing pain point for individuals, businesses and CSPs, according to Allot. Consumers are the main target of these attacks, and they are calling for better …

100% of IT execs are modernizing architectures, but struggling with data silos and vendor lock-in
99% of IT execs report challenges with architecture modernization and 98% report challenges with their corporate data architectures (data silos), a DataStax survey reveals. …

How to improve the hiring and retaining of infosec professionals?
The cybersecurity staffing and skills shortage is a well-known reality and the situation is predicted to get worse in the coming years. There are many problems There are …

50% of organizations believe attackers can infiltrate their networks each time they try
As organizations increase investments in automation and agility, a general lack of awareness about the existence of privileged credentials – across DevOps, robotic process …
Featured news
Resources
Don't miss
- IntelMQ: Open-source tool for collecting and processing security feeds
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry