Please turn on your JavaScript for this page to function normally.
industry
Cybersecurity should not be an afterthought within industrial environments

The basics of cyber security are still not being practized regularly and new cyber security risks are emerging as more and more untested technologies are integrated within the …

Windows
Most SMB devices run Windows versions that are expired or will expire by January 2020

There is a steady increase in attacks and changes in attack methods that target weaknesses in encryption, workload configuration, limited visibility into vulnerabilities and …

bot
Are humans ready for AI to take control of digital security?

Just over a quarter (26%) of people in EMEA would prefer their cybersecurity to be managed by AI rather than a human, an online study conducted by Palo Alto Networks and …

Cynet platform
Incident response at the speed of light: Cynet launches free offering for incident response service providers

More and more, organizations take the route of outsourcing incident response to Managed Security Service Providers. This trend is distinct regardless of the organization’s …

patch
July Patch Tuesday forecast: Rules are changing for companies with custom applications

Every month I discuss the regular patches released for operating system or applications, but today I want to focus on some of the development components that are often …

identity
Why identity is the foundation of security

Once upon a time, companies secured their valuable information by locking file cabinets and installing passwords and firewalls around databases and systems in office-based …

businessman
Experts weigh in on salient issues around emerging threats and security tech

RSA Conference unveiled expert insights into salient issues around emerging threats and security technologies. Based on industry observations and interactions with partners …

Face
Insider attacks still far more difficult to detect and prevent than external cyber attacks

A recent survey conducted by Gurucul of more than 320 IT security experts, found that 15 percent of people said they would delete files or change passwords upon exiting a …

iPhone
Most organizations plan to adopt new authentication solutions within two years

Enabling mobile device authentication with biometric-based access is the best approach to eliminate passwords, according to MobileIron. Percentage of respondents identifying …

connection
How companies innovate as they face industry disruption

Nearly three-quarters (72%) of industry sectors experienced an increase in disruption over the past eight years, leaving $41 trillion in enterprise value (market …

tunnel
Week in review: The art and science of password hashing, cybersecurity crisis comms

Here’s an overview of some of last week’s most interesting news, articles and podcasts: Bringing more talented individuals into the security industry In this interview, Tony …

zero
Trust dimensions in zero trust security

The increasing sophistication of cyberattacks and subsequent costs associated with containment and remediation has brought about an evolution in the security industry. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools