Please turn on your JavaScript for this page to function normally.
DDoS
Multi-vector DDoS attacks on the rise, attackers indiscriminate and persistent

Comcast Business published results from a report which provides an overview of the distributed denial of service (DDoS) attack landscape, trends experienced by its customers …

connection
Siloed technology management increases operational blind spots and cyber risk

Oomnitza revealed a snapshot survey, conducted by Gatepoint Research, which found that siloed technology management is increasing operational blind spots and cyber risk. While …

endpoint protection
eBook: A new breed of endpoint protection

Our workforce has rapidly evolved, with millions of employees permanently working from home or transitioning to a hybrid setting. Unfortunately for cybersecurity, hackers …

email
Email encryption flexibility builds customer trust and business revenue

Intentional and unintentional data breaches in emails are not unusual, and since they are the backbone of communication, organizations need to keep their data protected. …

Fraudsters pass KBA better than genuine customers

Per Pindrop, data dealers have grown more sophisticated and now offer more services, better details and more organized information. As a result, 2021 was a record breaking …

Download: CISO’s guide to choosing an automated security questionnaire platform

Failing to adequately screen suppliers’ security can lead to data breaches, which can shut down operations, damage customer trust and incur hefty regulatory penalties. An …

password
MFA: A simple solution to protect your identity

In this video for Help Net Security, Dan Lohrmann, Field CISO at Presidio, talks about multi factor authentication (MFA) and how everyone should consider it to protect their …

Data
Do you need cyber asset attack surface management (CAASM)?

In this video for Help Net Security, James Mignacca, CEO at Cavelo, talks about cyber asset attack surface management (CAASM), which Gartner recently identified as an emerging …

Kubernetes
Principles for Kubernetes security and good hygiene

Traditional methods of software security are not a good fit for Kubernetes: a renewed set of security implementations are required to make it less vulnerable. What’s …

users
Manage and monitor third-party identities to protect your organization

SecZetta shared a research that demonstrates a clear misalignment between the strategies organizations currently use and what is actually required to protect them from …

shadow IT
Shadow IT is a top concern related to SaaS adoption

Torii announced a report revealing that 69% of tech executives believe shadow IT is a top concern related to SaaS – or cloud application – adoption. The majority of …

Fraudsters answer security questions better than customers

Pindrop released a report uncovering how companies might be accidentally inviting fraud, threat mongers from the dark web and bad actors better prepared to pass …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools