Please turn on your JavaScript for this page to function normally.
ukraine attacks
Four key risks exacerbated by Russia’s invasion of Ukraine

Russia’s invasion of Ukraine has altered the emerging risk landscape, and it requires enterprise risk management (ERM) leaders to reassess previously established …

Biohazard
Healthcare cybersecurity trends: Organizations not quite ready to deal with threats

Protected Harbor announced the launch of its latest whitepaper on healthcare cybersecurity which offers readers an insight into evolving healthcare data breach patterns, …

Terminal
Attackers have come to love APIs as much as developers

Cequence Security released a report revealing that both developers and attackers have made the shift to APIs. Of the 21.1 billion transactions analyzed in the last half of …

mobile
Severity of mobile threats rising, 10+ million mobile endpoints impacted

Zimperium published a report unveiling new data and comprehensive analysis of the state of mobile security worldwide. In 2021, the Zimperium zLabs team discovered threats …

Data
Realizing the importance of data literacy

Tableau published a Forrester Consulting research exploring the role data skills play in driving business outcomes. The study found that despite increasing demand for data …

IaaS
IaaS market to grow steadily by 2031

The infrastructure-as-a-service (IaaS) market to expand at a CAGR of 28.5% during the forecast period from 2021 to 2031, according to Transparency Market Research. Rising …

How long does it take to develop cyber capabilities?

An Immersive Labs report uncovered the workforce cyber capabilities of cybersecurity, application security and crisis response teams. Analysis of 35,000 cybersecurity team …

shadow
Will vacancies create security voids?

Automation may be shortening the Mean Time to Response (MTTR) when it comes to detecting and responding to attacks, but there is still no substitute for the human in the kill …

handshake
How to build a security tool that sells

In my experience as a CISO in the industry, as well as in my current position as CISO-in-Residence at YL Ventures, an early-stage, cybersecurity-focused venture capital firm, …

lock
Attackers using default credentials to target businesses, Raspberry Pi and Linux top targets

Findings from a Bulletproof report highlight the issue posed by poor security hygiene as automated attacks remain a high security threat to businesses. The research gathered …

bomb
How fast can organizations respond to a cybersecurity crisis?

Immersive Labs launched an analysis of human cyber capabilities. The report analyzed cyber knowledge, skills and judgment from over half a million exercises and simulations …

Biden legitimizes cryptocurrency with regulatory exploration

For some time, cryptocurrency was considered a fringe currency – a libertarian means of investing that challenged the traditional framework of brokers, trade desks and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools