Please turn on your JavaScript for this page to function normally.
finance
94% of attacks hitting financial services use one of four methods

Newly released data from Akamai’s 2019 State of the Internet / Security Financial Services Attack Economy Report has found that 50% of all unique organizations impacted by …

innovation
Passion, ingenuity and hard work: The cybersecurity startup story of Israel

According to Start-Up Nation Central (SNC), there are currently 400 cybersecurity start-ups operating in Israel. In 2018, they raised over $1.2 billion in 96 rounds of …

Password
Microsoft is right, mandatory password changes are obsolete

Microsoft has recently come out and said that mandatory password changing is ancient and obsolete. This goes directly against everything we were trained to think for the last …

Lock
The probability that an EV SSL certificate is associated with a bad domain is 0.013%

In 2018, phishing attacks were attempted 482.5 million times, more than doubling the number of incidents in 2017. New research conducted by the Georgia Institute of Technology …

brain
Companies struggle with the slow, unpredictable nature of AI projects

Despite significant investment in AI, many companies are still struggling to stabilize and scale their AI initiatives, according to Dotscience. While 63.2% of businesses …

cloud
Orchestrating security policies across your hybrid cloud with intelligent data virtualization

The proliferation of data is causing a security and governance challenge across the hybrid cloud. Estimates project the global datasphere will grow from 33 zettabytes in 2018 …

Tools
53% of enterprises have no idea if their security tools are working

The majority of organizations don’t know if the security tools they deploy are working, and are not confident they can avoid data breaches, according to AttackIQ. AttackIQ …

Phishing
Assessing the efficiency of phishing filters employed by email service providers

Technology companies could be doing much more to protect individuals and organizations from the threats posed by phishing, according to research by the University of Plymouth. …

contactless payment
Flaws allow attackers to bypass payment limits on Visa contactless cards

Flaws that allow attackers to bypass the payment limits on Visa contactless cards have been discovered by researchers Leigh-Anne Galloway and Tim Yunusov at Positive …

Twitter
While cybercriminals abuse Twitter, threat researchers use it to boost threat intelligence efforts

Cybercriminals are abusing Twitter via tech support scams, command-and-control (C&C) operations and data exfiltration, according to Trend Micro. Misuse of social networks …

light
Whitepaper: Building a Threat Intelligence Programme (UK)

ThreatConnect surveyed more than 350 cybersecurity decision makers in the UK. The result: Building a Threat Intelligence Programme discusses research findings on best …

secure
How to secure your data as you go digital

To scale more efficiently and serve customers better, companies are moving more workloads and services to the cloud. According to IDG, 37 percent of companies are increasing …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools