GitHub Code Scanning aims to prevent vulnerabilities in open source software
GitHub has made available two new security features for open and private repositories: code scanning (as a GitHub-native experience) and secret scanning (both still in beta). …
The new cyber risk reality of COVID-19 operating mode
There’s little, if any, precedent for the time we’re experiencing right now with a pandemic changing the corporate landscape in profound ways. But while many are reacting in …
99% of enterprise users reuse passwords across accounts
Very few users take appropriate action to significantly reduce the risk of password compromise, according to a Balbix report. The study found that more than 99% of enterprise …
How to increase cyber defense agility for the next lockdown
If this worldwide lockdown has taught us anything, it’s that we’re not nearly agile enough and we really need to prepare for future scenarios. Whether the next lockdown comes …
Financial services leading the way in adopting DevOps, still hurdles remain
Businesses in financial services are ahead of the government sector in adopting DevOps to increase their speed of development and free up developer time, but hurdles still …
Is the stress of card fraud worth the digital convenience?
With a growing portion of consumers having now fallen victim to card fraud, anxiety about the security of our digital accounts is spiking, according to a survey by Marqeta. …
How a favicon delivered a web credit card skimmer to victims
Cyber crooks deploying web credit card skimmers on compromised Magento websites have a new trick up their sleeve: favicons that “turn” malicious when victims visit …
Firefox 76 delivers new password security features and security fixes
Mozilla has released Firefox 76, which comes with critical security fixes and new features related to Firefox Lockwise, the browser’s password manager/generator …
Passwords still widely used, despite known weaknesses
Nearly a third (29%) of organizations in Europe and the Middle East still see usernames and passwords as one of the most effective means to protect access to their IT …
Destination Cyberlandia: 3 keys to cyber happiness amid COVID-19
Close your eyes and imagine an optimum state of happiness. People may envision different things — a beach, a hike through the woods, a family meal — but most cybersecurity …
Shifts in device usage have large security implications
There have been rapid substantial changes in device usage trends, and the connected security implications, as businesses shifted their operations in March due to COVID-19, …
Most attacks successfully infiltrate production environments without detection
While organizations continue to invest significant budget dollars in security controls and assume that this means assets are fully protected, the reality is that a majority of …
Featured news
Resources
Don't miss
- Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026
- CISO Assistant: Open-source cybersecurity management and GRC
- Firmware scanning time, cost, and where teams run EMBA
- How AI image tools can be tricked into making political propaganda
- Product showcase: Orbot – Tor VPN for iOS