Please turn on your JavaScript for this page to function normally.
week in review
Week in review: Pen testing, Sunspot malware, Microsoft plugs Defender zero-day

Here’s an overview of some of last week’s most interesting news and articles: Top videoconferencing attacks and security best practices Videoconferencing has …

bot
What analytics can unveil about bot mitigation tactics

25% of internet traffic on any given day is made up of bots, the Kasada Research Team has found. In fact, there is a synthetic counterpart for almost every human interaction …

gap
Understanding third-party hacks in the aftermath of SolarWinds

In the aftermath of the SolarWinds hack, a better understanding of third-party hacks in any update that you provide to your colleagues, bosses, and even the board of directors …

thief
Fraudulent attempt purchase value decreased by $10 in 2020 compared to 2019

There has been a 24 percent increase in eCommerce transactions globally in December 2020 compared to December 2019, ACI Worldwide reveals. In particular, eCommerce …

5G
Revenue for 5G enterprises in the Asia-Pacific region to reach $13.9B by 2024

Mega trends across the government and public sector, healthcare, manufacturing, and telecommunications are posing new challenges to end users in vertical industries in the …

bot
Minimizing cyberattacks by managing the lifecycle of non-human workers

The number of non-human workers is growing, particularly as global organizations increasingly prioritize cloud computing, DevOps, IoT devices, and other digital transformation …

healthcare
Healthcare IT teams battle with technical challenges to ensure network resilience and security

IDG surveyed IT leaders from hospitals, primary and urgent care facilities, pharmaceutical companies, and other healthcare entities. The goal was to shed light on how …

cloud
43% of financial services orgs plan to increase private cloud investments

Nutanix announced the financial services industry findings of its report, measuring organizations’ plans for adopting private, hybrid and public clouds. The findings point to …

medical devices
The future history of medical device cybersecurity

In 1555, Nostradamus published his famous Les Prophéties containing obfuscated prophecies for the world to come. Some believe that one of these predictions pertains to the …

drown
SOC analysts overloaded, but role more important than ever

Organizations are spending more to account for widespread security operation center (SOC) challenges including growing security management complexity, increasing analyst …

USA flag
It’s time for a national privacy law in the US

Consumer data privacy is no longer a necessary evil but a competitive differentiator for any company participating in the global economy. The EU’s GDPR represents the world’s …

tools
Addressing the lack of knowledge around pen testing

The vast majority of attackers are opportunist criminals looking for easy targets to maximize their profits. If defenses are sufficiently fortified, finding a way through will …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools