Please turn on your JavaScript for this page to function normally.
code
80% of security leaders would like more control over their API security

There are major gaps in API security based on insights from over 100 senior security leaders at large enterprises in the United States and Europe, an Imvision report reveals. …

Healthcare
Data breaches and network outages: A real and growing cost for the healthcare industry

One year into the COVID-19 pandemic, the Infoblox report reveals major challenges the healthcare industry faced as IT workers scrambled to secure protected health information …

Special pricing on CISSP and CCSP training bundle
Special pricing on CISSP and CCSP training bundle

Whether you’re motivated by career advancement, higher pay or inspiring a safe and secure cyber world, the (ISC)² CISSP and CCSP certifications are professional game-changers. …

fraud detection
How to stay ahead of the rise of synthetic fraud

While banks have been successful in reducing card fraud in recent years, a new and rising threat has emerged: synthetic identity fraud. By combining real and falsified …

cloud complexity
Cybercriminals capitalizing on our reliance on the cloud

90% of cyberattacks on cloud environments in the last 12 months involved compromised privileged credentials, according to a research from Centrify. Most cloud environments …

tools
Rapid increase in security tools causing alert fatigue and burn out

On average, enterprises maintain 19 different security tools, with only 22% of such tools serving as vital to primary security objectives, a ReliaQuest survey reveals. The …

compliance
Compliance department spending plateaued in 2020

A study of 117 organizations in the second half of 2020 showed that compliance department spending was projected to plateau in 2020 after several years of rapid growth, …

hands
Data protection challenges hinder digital transformation initiatives

Data protection challenges are undermining organizations’ abilities to execute digital transformation (DX) initiatives globally, according to the Veeam report, which has found …

hole
The financial impact of cybersecurity vulnerabilities on credit unions

Cybersecurity vulnerabilities among credit unions and their vendors create the potential for large financial impacts to the credit union industry, according to a Black Kite …

week in review
Week in review: Attacks on Exchange servers escalate, the influence of the Agile Manifesto, O365 phishing

Here’s an overview of some of last week’s most interesting news and articles: Ongoing Office 365-themed phishing campaign targets executives, assistants, financial departments …

Person
The benefits and challenges of passwordless authentication

More and more organizations are adopting passwordless authentication. Gartner predicts that, by 2022, 60% of large and global enterprises as well as 90% of midsize enterprises …

network
The democratization of the workplace through edge computing

It’s been a year since we first learned about COVID-19, but the pressure on businesses to accelerate their digital transformation (DX) efforts has not abated. Of particular …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools