Please turn on your JavaScript for this page to function normally.
binary bomb
SmokeLoader malware downloader enters list of most wanted malware

Check Point has published its latest Global Threat Index for December 2018. The index reveals that SmokeLoader, a second-stage downloader known to researchers since 2011, rose …

Network
Considering an SD-WAN deployment? The best solution may already be in your network

When the internet goes down, business stops. Every business today relies on cloud applications to run day-to-day operations, including CRM applications like Salesforce, …

success
Why security by design and security DevOps are so critical to success

The advances made in technology throughout the past several decades have brought about an inevitable digital transformation, which companies are experiencing in today’s world. …

business
Most organizations are migrating data for ERP apps to the cloud

According to a Cloud Security Alliance survey, 69 percent of organizations are migrating data for popular ERP applications to the cloud, moving to major cloud …

money
Revenue from sales of IT infrastructure products for cloud environments reached $16.8 billion

According to the IDC, vendor revenue from sales of IT infrastructure products (server, enterprise storage, and Ethernet switch) for cloud environments, including public and …

arrows
Week in review: How data becomes intelligence, email security predictions, EU bug bounties

Here’s an overview of some of last week’s most interesting news and articles: The attack surface is growing faster than it has at any other point in the history of …

healthcare
Four cybersecurity trends every CIO should know

The cybersecurity landscape in 2019 will likely bolster bigger, more complex threats and developments. Given the intricacy of today’s cyber security challenges, organisations …

lock
There’s a sizable gap between confidence in security programs and their effectiveness

A Syncsort survey of over 300 respondents found that while 85 percent of respondents are either very or somewhat confident in their organization’s security program, 41 percent …

Euro
Evaluating €1bn in cybersecurity research funding

Crossword Cybersecurity looked at nearly 1,200 current and past research projects from academic institutions in the United Kingdom, United States, Europe, Australia, and …

icosahedral
Understanding how data becomes intelligence is central for any successful security program

Threat intelligence is one of the hottest terms in information security at the moment. But, as with so many buzzwords, it is often overused and misused. All the buzz has …

GDPR
GDPR: Five tips for organizations to remain compliant

For the majority of UK businesses, a huge amount of time and resource was invested to become GDPR compliant in time for the May 2018 deadline. The cost of implementing GDPR …

email
Email security predictions: What we can expect in 2019

2018 shed a lot of light on how expensive successful phishing attacks can be, with the FBI reporting in July well over $12B in financial losses due to business email …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools