Closing the skills gap can minimize the business impact of cyberattacks
CISOs who are successful at reducing or closing the critical skills gap have the highest probability of minimizing the business impact of cyberattacks – even when budgets and …
Organizations with poor privacy practices 80% more likely to suffer data breach
There’s a predictive relationship between responsible privacy practices and security outcomes, according to Osano. Companies with inadequate data privacy practices are …
Human error: Understand the mistakes that weaken cybersecurity
43% of US and UK employees have made mistakes resulting in cybersecurity repercussions for themselves or their company, according to a Tessian report. With human error being a …
Deep Packet Inspection challenges for telecom and security vendors
Enea announced the results of the first survey about deep packet inspection (DPI) challenges, conducted among high-tech product managers. The goal of the survey is to better …
There’s CISSP training, then there’s official CISSP training
The CISSP is the most highly regarded certification in the cybersecurity industry, so it isn’t surprising that countless training companies offer CISSP exam prep. But you …
Microsoft releases new encryption, data security enterprise tools
Microsoft has released (in public preview) several new enterprise security offerings to help companies meet the challenges of remote work. Double Key Encryption for Microsoft …
Adobe out-of-band security updates for Photoshop, Prelude, Bridge
A week after July 2020 Patch Tuesday, Adobe has released out-of-band security updates to fix thirteen vulnerabilities – twelve of which critical – in Adobe …
How do I select a DMARC solution for my business?
Domain-based Message Authentication, Reporting & Conformance (DMARC), is an email authentication, policy, and reporting protocol. It builds on the SPF and DKIM protocols …
Cybersecurity teams are struggling with a lack of visibility into key security controls
89% of security professionals are most concerned about phishing, web and ransomware attacks. This is especially alarming, considering that only 48% confirm that they have …
Researchers develop new learning algorithm to boost AI efficiency
The high energy consumption of artificial neural networks’ learning activities is one of the biggest hurdles for the broad use of AI, especially in mobile applications. …
20,000+ new vulnerability reports predicted for 2020, shattering previous records
Over 9,000 new vulnerabilities have been reported in the first six months of 2020, and we are on track to see more than 20,000 new vulnerability reports this year — a new …
Emerging risk trends: Top risks to identify and address
Senior executives reported concerns around renewed outbreaks of the COVID-19 pandemic as their top emerging risk in the second quarter of 2020, according to Gartner. Gartner …
Featured news
Resources
Don't miss
- Google agrees to pay $135 million over Android data harvesting claims
- SolarWinds fixes critical Web Help Desk RCE vulnerabilities, upgrade ASAP!
- Open-source malware zeroes in on developer environments
- Hottest cybersecurity open-source tools of the month: January 2026
- A practical take on cyber resilience for CISOs