Please turn on your JavaScript for this page to function normally.
week in review
Week in review: Strengthening firmware security, Help Net Security: XDR Report released

Here’s an overview of some of last week’s most interesting news, articles and interviews: Help Net Security: XDR Report has been released The topic of this …

AI
Policy automation to eliminate configuration errors

Far too often, major security breaches can be traced back to a configuration error. Changes and adjustments to network and security configurations are unavoidable; they are a …

Android
Android data sharing remains significant, no opt-out available to users

An in-depth analysis of a range of popular Android mobile phones has revealed significant data collection and sharing, including with third parties, with no opt-out available …

endpoint protection
70% of businesses can’t ensure the same level of protection for every endpoint

A Deep Instinct research, which seeks to discover the cybersecurity concerns keeping CISO’s and SecOps professional up at night, found that 86% of UK respondents believe …

face
Human hacking increased as apps and browsers moved completely to the cloud

Human hacking – phishing attacks across all digital channels – has dramatically increased in 2021. SlashNext released its first report showing a 51% increase in attacks …

arrows
Finance data management initiatives constrained by lack of digital skills and maturity

Data management initiatives in the finance sector, such as data collection, integration, and automation, are being constrained by a severe lack of digital skills and maturity. …

account
Organizations failing to give users the login experience they want

Companies often claim to be customer-centric, or even customer-obsessed, striving to offer technologies that their users demand. However, the findings of a recent global Auth0 …

What is CCPA?
Whitepaper: What is CCPA and how can it affect your business?

Learn about California’s Consumer Privacy Laws and Regulations (CCPA and CPRA), what is their impact on your security and how to comply with their essential …

ransomware
Add a new dimension to ransomware defenses

Ransomware is a particularly heartless endeavor. Criminals have targeted schools, vital infrastructure, and even patient records at a psychiatric treatment facility. The US …

stop
Organizations losing business due to connected product security concerns

59% of executives with cybersecurity decision-making responsibility at large and mid-sized companies say that their organizations have lost business due to product security …

ThreatMapper
ThreatMapper: Open source platform for scanning runtime environments

Deepfence announced open source availability of ThreatMapper, a signature offering that automatically scans, maps and ranks application vulnerabilities across serverless, …

glasses
Everyday cybersecurity practices inadequate among many online consumers

Bitdefender released a report which reveals how consumers across various age groups and socio-demographic backgrounds behave on popular platforms, applications and devices, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools