
SecOps reality gap: 85% say practicing SecOps is a goal, 35% actually do
More than half of companies (52 percent) admit to cutting back on security measures to meet a business deadline or objective. Based on a survey of over 200 senior-level …

Successful digital business transformation requires a cultural shift
When embarking on a digital business transformation, too often organizations ignore the need to change the mindset of their staff, according to Gartner. A technology shift not …

Hackers breached German government’s secure computer networks
The Russia-linked Sofacy hacking group has breached the secure computer networks of a number of German federal agencies. The group – also known as APT28, Fancy Bear, and …

(IN)SECURE Magazine issue 57 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. We’ve redesigned the magazine from the ground up …

What employers need to know about cybersecurity jobseekers
Based on a blind survey of cybersecurity professionals in the United States and Canada, a new (ISC)² report reveals low numbers of highly engaged workers. Only 15% of …

Nearly half of security pros rarely change their security strategy, even after a cyber attack
Nearly half (46 percent) of IT security professionals rarely change their security strategy substantially – even after experiencing a cyber attack. This level of cyber …

Digital readiness and transformation: Agile and DevOps
While most organizations are committed to the full adoption of both agile and DevOps, many are struggling with key challenges and missing out on the extensive benefits these …

Phillips clinical imaging solution plagued by vulnerabilities
Phillips is developing a software update to mitigate 35 CVE-numbered vulnerabilities in the Philips IntelliSpace Portal (ISP), a clinical imaging visualization and analysis …

Download: CISSP Exam Study Guide
This promotion has ended. The CISSP Exam Study Guide provides a solid foundation for anyone preparing to become a Certified Information Systems Security Professional. It …

Surge in memcached-based reflected DDoS attacks is due to misconfigured servers
Massive memcached-based reflection DDoS attacks with an unprecedented amplification factor have been ongoing for the last few days, by taking advantage of memcached servers …

Cybersecurity pros don’t feel equipped to stop insider attacks
Based on interviews with nearly 1,500 cybersecurity professionals over three years, Haystax Technology released a study that makes it clear that organizations are feeling the …

Mobile security: A look at the risks, and what you can do
A new report from Verizon found that organizations across numerous industries compromised mobile data security because of speed to market priorities and a lack of threat …
Featured news
Resources
Don't miss
- Product showcase: Secure digital and physical access with the Swissbit iShield Key 2
- Trojanized KeePass opens doors for ransomware attackers
- Closing security gaps in multi-cloud and SaaS environments
- Containers are just processes: The illusion of namespace security
- Why legal must lead on AI governance before it’s too late