Please turn on your JavaScript for this page to function normally.
phishing
Hackers go phishing for the holidays

It’s that time of year again. Everyone’s busy – at work and at home. That includes cybercriminals, too. In fact, the holiday season is when busy, distracted people tend to be …

analyst
CISOs are skeptical about claims made by cybersecurity vendors

There is a high level of skepticism about claims due to vague product descriptions, ambiguous statistics, limited ability to measure product effectiveness, and a general lack …

password
Worst passwords of 2019: Are you using one of them?

SplashData released their “Worst passwords of 2019” list, which includes the top 25 most dangerous and most commonly leaked passwords. In an interesting turn of …

hunt
What is the actual role of a threat hunter?

The role and tasks of a threat hunter are confusing, according to a ThreatQuotient and SANS study based on data collected from 575 participating companies that either work …

Cynerio
Download: The Risk Mitigation Handbook for Connected Medical Devices

Wondering what it takes to secure clinical networks in your healthcare organization? Get The Risk Mitigation Handbook for Connected Medical Devices, a practical approach to …

lock
The holiday season: A cybercriminal’s winter wonderland

It’s the most wonderful time of the year – for cybercriminals that is. With increased online sales, major commercial holidays like Black Friday and Cyber Monday present …

danger
Hacking and malware cause 75% of all data breaches in the financial services industry

Only 6% of all breaches in 2019 were suffered by financial services firms, according to Bitglass. However, these breaches compromised significantly more records than those …

wireless
Major vulnerabilities found in popular wireless presentation system

F-Secure consultants have discovered several exploitable vulnerabilities in Barco’s ClickShare wireless presentation system. Attackers can use the flaws to intercept and …

architecture
Top enterprise analytics trends for 2020

The top 10 enterprise analytics trends to watch in 2020 have been announced by MicroStrategy in collaboration with analysts and influencers from Forrester, IDC, Constellation …

sharing
The cybersecurity labor crunch highlights gaps in threat intelligence practices

In Greek mythology, Sisyphus, the King of Corinth, was punished by Hades by being forced to roll a huge stone up a hill, only to have it roll down again as soon as he reached …

identity theft
The privacy and security trends that will shape 2020

Privacy concerns will ratchet up further around IoT and 5G. Even if the industry manages to secure the billions of IoT devices already deployed, they permeate so many aspects …

broken
Most security pros admit to accidental internal breaches at their organization

44% percent of executives believe employees have erroneously exposed personally identifiable information (PII) or business-sensitive information using their company email …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools