Please turn on your JavaScript for this page to function normally.
zero
Challenges organizations face when implementing zero trust architecture

98 percent of UK business leaders and IT decision makers either plan to or have already started implementing zero trust strategies at their organizations, according to …

network
What is driving organizations to explore emerging technologies?

Engineering trust, accelerating growth and sculpting change are the three overarching trends on the Gartner Hype Cycle for Emerging Technologies, 2021 that will drive …

money
GRC solutions revenues to reach nearly $15.2 billion in 2025

Worldwide revenues for governance, risk, and compliance (GRC) software experienced healthy growth in 2020, growing 8.2% year over year, despite concerns of a market downturn …

vulnerability
Vulnerability management is facing three core problems: Here’s how to solve them

The COVID-19 pandemic has placed enormous stress on information security professionals. A threat landscape that was already growing more complex by the minute now presents an …

search
Checking for misconfigurations isn’t enough

Misconfiguration errors are often the main focus of security for cloud-native applications, and for good reason. Earlier this year, Hobby Lobby accidentally exposed 136 GB of …

idea
Cybersecurity market soaring as threats target commercial and govt organizations

Over the past year, it’s been impossible to ignore the rising tide of threats targeting government and commercial organizations around the world, and the cybersecurity market …

bomb
How Avanan helps you reduce phishing and ransomware

How does ransomware begin? According to a new report from Palo Alto Networks, the answer is primarily through email. The report shows the top arrival protocols for ransomware. …

5G
Private network deployments are slow, the window of opportunity for enterprise 5G is closing

There are more than 290 fully publicly disclosed private network deployments worldwide, according to a research published by ABI Research. In China, the industry assumes there …

person
Employees participating in unethical behaviors to help an organization actually harm themselves

When employees participate in unethical behaviors meant to help an organization, such as lying about products or withholding negative information about the organization, this …

Microsoft 365
Why you need to make Microsoft 365 a 24/7 security priority

It’s easy to take advantage of the Microsoft 365 service, but are you taking the steps to properly secure all the data your company is storing inside of it? For security …

innovation
How the pandemic delivered the future of corporate cybersecurity faster

William Gibson once wrote, “The future is already here – it’s just not very evenly distributed.” The rise of “distributed work”—people working from everywhere, at all …

Linux
Coinminers, web shells and ransomware made up 56% of malware targeting Linux systems in H1 2021

Trend Micro released a research on the state of Linux security in the first half of 2021. The report gives valuable insight into how Linux operating systems are being targeted …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools