Please turn on your JavaScript for this page to function normally.
identity theft
Shedding light on the threat posed by shadow admins

Few organizations would purposefully hand a huge responsibility to a junior staff member before letting them fly solo on their own personal projects, but that’s effectively …

code
APIs in the insurance industry: Accessing a growing world of data

The insurance industry is vast and varied. It can be found in nearly every country in the world, with the earliest references dating back as early as 1750 BC. Modern …

threat modeling
What is threat modeling and why should you care?

While there is not one exact industry wide definition, threat modeling can be summarized as a practice to proactively analyze the cyber security posture of a system or system …

vault
Researchers develop program that helps assess encryption systems’ vulnerabilities

Anastasia Malashina, a doctoral student at HSE University, has proposed a new method to assess vulnerabilities in encryption systems, which is based on a brute-force search of …

eavesdropping
Lack of visibility into IT assets impacting security priorities

Axonius released a report which reveals the extremes to which the pandemic escalated lack of visibility into IT assets and how that is impacting security priorities. According …

Earth
AI can alter geospatial data to create deepfake geography

A fire in Central Park seems to appear as a smoke plume and a line of flames in a satellite image. Colorful lights on Diwali night in India, seen from space, seem to show …

PKI
PKI market valuation to cross $7 billion by 2027

The market valuation of public key infrastructure will cross $7 billion by 2027, according to Global Market Insights. Rising digital interaction and reliance on digital …

Code42 enhances Incydr to help identify insider risk related to file uploads to unsanctioned websites

Code42 is introducing enhanced capabilities to the Code42 Incydr data risk detection and response product for identifying insider risk related to file uploads to unsanctioned …

Entrust PKIaaS simplifies cloud migration with pre-built secure solutions

Entrust announced Public Key Infrastructure (PKI) as-a-Service. The next generation of its high-assurance PKI, Entrust PKIaaS is secure, quick to deploy, scales on-demand, and …

Kisi Intrusion Detection allows customers to implement alarm policies from their Kisi dashboard

Kisi has launched its own Intrusion Detection product, moving the company towards becoming a complete physical security solution. Intrusion Detection allows customers to …

Echoworx introduces biometric authentication to its Email Encryption platform

Echoworx announced the introduction of biometric authentication to its Echoworx Email Encryption platform, enabling secure passwordless authentication options. By leveraging …

Mirantis Lens IDE for Kubernetes helps accelerate adoption of cloud-native technologies

Mirantis announced a new version of Lens – the Kubernetes IDE (Integrated Development Environment). Lens 5 unlocks teamwork and collaboration, eliminating the pain of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools