Please turn on your JavaScript for this page to function normally.
Black Hat
Security trends to follow at Black Hat USA 2019

Black Hat USA 2019 is just around the corner! Selecting which sessions to attend from among the conference’s jam-packed catalog of training sessions, panels and briefings can …

Idea
How effective is your security operations center?

While the SOC is considered an essential or important component of business, most security professionals rate their SOC’s effectiveness as low, and 49 percent say it is not …

cloud money
Global IaaS market reached $32.4 billion in 2018, total growth was 31.3%

The worldwide infrastructure as a service (IaaS) market grew 31.3% in 2018 to total $32.4 billion, up from $24.7 billion in 2017, according to Gartner. Amazon was once again …

AI
The rise of biometrics and passwordless security

Whether you realize it or not, our current era of mobile and cloud computing can be defined, both positively and negatively, by shared secrets. Shared secrets — passwords, …

arrows
How to increase the efficiency of your risk and compliance management strategy

The rise of new business processes and the changing government rules and regulations around the globe are posing challenges for small and big companies alike, according to …

SD-WAN
SD-WAN continues to be one of the fastest-growing segments of the network infrastructure market

The SD-WAN infrastructure market will grow at a 30.8% compound annual growth rate (CAGR) from 2018 to 2023 to reach $5.25 billion, according to IDC’s SD-WAN …

Fire
Week in review: Crafty Office 365 phishing, how DNS firewalls can burn security teams

Here’s an overview of some of last week’s most interesting news and articles: Phishers targeting Office 365 admins have a new trick up their sleeve Phishers …

person
Damaging insider threats rise to new highs in the past year

70 percent of organizations are more frequently seeing insider attacks, with 60 percent experiencing one or more within the last 12 months, and 68 percent feeling “extremely …

industrial
The need for scalable OT security

As manufacturers and other industrial network owners are becoming more security conscious, they are coming up against security performance issues. Operational Technology (OT) …

Face
Current methods for anonymizing data leave individuals at risk of being re-identified

With the first large fines for breaching GDPR upon us, even anonymized datasets can be traced back to individuals using machine learning, researchers from University of …

email
Employees overestimate the efficacy of their workplace’s email security strategy

22 percent of businesses have experienced a data breach – defined as loss of confidential data or credentials, compromised account loss, or fraudulent financial transactions – …

wolf
Most SMBs have not identified and documented cybersecurity threats

A majority of small and medium-sized businesses (SMBs) do not have cybersecurity protection at the top of their agenda and are highly prone to risks and vulnerabilities, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools