Please turn on your JavaScript for this page to function normally.
brain
Imagination is key to effective data loss prevention

Security teams have a challenging job. They must manage an ever-expanding attack surface and protect huge volumes of data from bad actors who are constantly evolving their …

application
Positive trends in the application security space

ShiftLeft recently released their 2022 AppSec Progress Report, which evaluated how the changes and advancements in static application security testing (SAST) and intelligent …

server
The threat of quantum computing to sensitive data

According to the US National Counterintelligence and Security Center, the U.S. is in a global quantum computing race, and China is winning. One emerging technology that could …

attacks
Cyberattacks against law enforcement are on the rise

Resecurity, a Los Angeles-based cybersecurity company protecting Fortune 500 companies worldwide, has registered an increase in malicious activity targeting law enforcement …

Resecurity
Resecurity’s AI-powered solutions now available on Microsoft Azure

Resecurity’s AI-powered solutions provide proactive alerts and visibility of digital risks targeting the enterprise ecosystem. By joining the Microsoft Azure marketplace, …

quantum
NIST selects 4 quantum-resistant encryption algorithms

The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has chosen the first group of quantum-resistant encryption tools, designed to withstand …

How a cyber asset management strategy can help enterprises detect threats

Whether it’s through stolen credentials, phishing attacks, or simply user errors, people continue to pose the greatest risk to cybersecurity. While behavioral attacks are …

Why your API gateway is not enough for API security?

The emergence of cloud computing architectures has caused enterprises to rethink the way applications are scaled. Impetuses were put on companies to get away from deploying …

industrial
The connected nature of smart factories is exponentially increasing the risk of cyber attacks

51% of industrial organizations believe that the number of cyber attacks on smart factories is likely to increase over the next 12 months, according to the Capgemini Research …

lock
Encryption is high up on corporate priority lists

The number of UK organizations implementing data encryption as a core part of their cybersecurity strategy has continued to rise, with 32% introducing a policy to encrypt all …

PCI DSS
PCI DSS 4.0 released, addresses emerging threats and technologies

The PCI Security Standards Council (PCI SSC) published version 4.0 of the PCI Data Security Standard (PCI DSS). PCI DSS is a global standard that provides a baseline of …

lock
Applying Shift Left principles to third party risk management

In this Help Net Security video, Etai Hochman, CTO at Mirato, talks about applying Shift Left, a concept that originated with developers to find and prevent defects early in …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools