Please turn on your JavaScript for this page to function normally.
magnifying glass
Top 5 security analytics to measure

You don’t need a Ph.D. in cybersecurity to recognize the importance of security analytics. Security analytics uses data analysis – often aided by machine learning – to …

money
Ransomware is up and victims are paying

Sophos released a survey and review of real-world ransomware experiences in a report which shows that 66% of organizations surveyed were hit with ransomware in 2021, up from …

hand
Cybercriminals deliver IRS tax scams and phishing campaigns by mimicking government vendors

Cybercriminals are leveraging advanced tactics in their phishing-kits granting them a high delivery success rate of spoofed e-mails which contain malicious attachments right …

Post-pandemic priorities for security leaders

Info-Tech Research Group has published its annual report on the priorities for security leaders. The report combines insights from the 2022 security priorities survey and …

cloud
Are businesses ready to implement cloud-native development?

OutSystems released findings from a global survey of IT leaders and developers gauging the benefits and challenges of cloud-native development, with results highlighting stark …

Attackers remain persistent and indiscriminate as multi-vector DDoS attacks continue to rise

Comcast Business published results from a report which provides an overview of the distributed denial of service (DDoS) attack landscape, trends experienced by its customers …

cloud
How to deal with security challenges fueled by multicloud environments

In this video for Help Net Security, Jane Wong, VP of Security Products at Splunk, talks about challenges organizations are facing to secure their multicloud environments. The …

Governments under attack must think defensively

In this video for Help Net Security, Tom Van de Wiele, Principal Security Consultant, Cyber Security Services at WithSecure, talks about cyber threats aimed at governmental …

zero
The hierarchy of cybersecurity needs: Why EASM is essential to any zero-trust architecture

Zero trust was born out of the critical need to modernize outdated IT architecture, which assumes that all assets within an organization – and attached to it – should be …

hands
Cyber-attack defense: CIS Benchmarks + CDM + MITRE ATT&CK

Victims lost $6.9 billion to cybercrime in 2021, according to FBI’s Internet Crime Complaint Center. To take a bite out of that number, the Center for Internet Security …

DDoS
Multi-vector DDoS attacks on the rise, attackers indiscriminate and persistent

Comcast Business published results from a report which provides an overview of the distributed denial of service (DDoS) attack landscape, trends experienced by its customers …

connection
Siloed technology management increases operational blind spots and cyber risk

Oomnitza revealed a snapshot survey, conducted by Gatepoint Research, which found that siloed technology management is increasing operational blind spots and cyber risk. While …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools