Please turn on your JavaScript for this page to function normally.
hands
Three ways to keep your organization safe from cyberattacks

Cyberattacks continue making headlines as more companies fall victim to ransomware. Throughout the past year, we saw some of the largest breaches, leaks, and real-world …

network
OSI Layer 1: The soft underbelly of cybersecurity

As traditional cybersecurity solutions improve, they push cyberattackers toward alternative paths. Layer 1 of the OSI model (i.e., the physical layer) has become a fertile …

Data
How to evaluate the security risk of your databases

Data has become one of our most important assets. We usually store data in databases, so knowing how to secure those is of vital importance. This article can help you quantify …

market
IT teams forced into compromising security for business continuity during pandemic

IT teams have been forced into compromising security for business continuity at a time of rising threats, a HP report reveals. Making matters worse, their attempts to increase …

backup
Server market revenue declining 2.5% YOY in 2Q21

Worldwide server market revenue declined 2.5% year over year to $23.6 billion during the second quarter of 2021 (2Q21), according to the International Data Corporation (IDC). …

network
Networking issues enterprises must address to improve business and operational efficiency

Enterprises have been forced to adapt to a new state of “normal,” shifting from traditional office-based operations to distributed environments that must still …

red
How to achieve digital dexterity with a predominantly hybrid workforce

The COVID-19 pandemic and the consequent switch to remote working changed many an office’s culture forever. Fast forward to a year later, and businesses are either continuing …

businessman
Mobile app creation: Why data privacy and compliance should be at the forefront

In today’s mobile app landscape, providing customers with the most tailored and personal experience possible is essential to edging out competitors. But creating such a …

cloud
Only 30% of enterprises use cloud services with E2E encryption for external file sharing

A recent study of enterprise IT security decision makers conducted by Tresorit shows that majority of enterprises use additional encryption methods to boost the security of …

gears
Enterprise automation adoption surging, security and compliance area jump by 171%

Workato unveiled a data report focused on the key trends that shaped automation over the past year. The anonymised data reveals major shifts in automation priorities as …

trend
Network security market growth driven by remote work popularity and security needs

Frost & Sullivan’s recent analysis of the Asia-Pacific (APAC) network security (NWS) market finds that the increasing acceptance of remote work and adoption of …

CCSP practice quiz
CCSP practice quiz: It’s time to test your knowledge

Studying for the CCSP exam? The CCSP practice quiz is a great (FREE) study tool that allows you to quickly identify any knowledge gaps you might have in each domain. Your quiz …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools