Please turn on your JavaScript for this page to function normally.
architecture
Future workforce: Intelligent technology meets human ingenuity

Businesses risk missing major growth opportunities unless CEOs take immediate steps to pivot their workforces and equip their people to work with intelligent technologies. The …

Skull
Escape future ransomware attacks by leveraging the right technology

Last year, multiple industry verticals saw the extreme effects of ransomware, with WannaCry and Petya leading the pack in terms of damage. To make matters worse, according to …

GDPR
GDPR: Whose problem is it anyway?

With the GDPR deadline looming on May 25, 2018, every organization in the world that transmits data related to EU citizens is focused on achieving compliance. And for good …

Market
Big predictions for sensors in the global security and surveillance market

The Internet of Things (IoT) is bringing about a new era of connectivity in the digital age, connecting critical business sectors through a network of secure data flow, …

structure
Week in review: DoS attacks against hard disk, ethical hacking, and the rise of ransom hacks

Here’s an overview of some of last week’s most interesting news and articles: Norwegian health authority hacked, patient data of nearly 3 million citizens possibly …

cloud spending
IT infrastructure spending for cloud environments to reach $46.5 billion in 2017

Total spending on IT infrastructure products (server, enterprise storage, and Ethernet switches) for deployment in cloud environments is expected to total $46.5 billion in …

HITBSecConf
HITB Security Conference in Amsterdam to feature innovative research on attack and defense topics

The agenda for Day 1 of the 9th annual HITB Security Conference in The Netherlands has been announced and it’s packed with cutting edge research on a range of attack and …

HackerOne
Is ethical hacking more lucrative than software engineering?

HackerOne published its 2018 Hacker Report, which examines the geography, demographics, experience, tools used and motivations of nearly 2,000 bug bounty hackers across 100 …

architecture
How digital transformation is reshaping the modern enterprise

F5 Networks announced the results of its 2018 State of Application Delivery report, which shows accelerating multi-cloud deployments are enabling organizations to select the …

One Identity - Balabit
One Identity acquires Balabit to bolster PAM solutions

One Identity announced the acquisition of Balabit, terms of the transaction were not disclosed. Balabit’s PAM solution provides protection from threats posed by high-risk, …

Europe
Why GDPR will drive a best practice approach

When GDPR was first discussed, many feared that it would force businesses to act more insular and become more defensive about their data. Some even believed there would be a …

Oracle
Oracle addresses 237 vulnerabilities across multiple products

The January 2018 Oracle Critical Patch Update (CPU) fixes 237 new security vulnerabilities across hundreds of Oracle products, including the company’s widely used Oracle …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools