Please turn on your JavaScript for this page to function normally.
GDPR
Balancing act: Ensuring compliance with GDPR and US regulations

The impending GDPR, which will go into effect in a little less than a year from now, is going to have a significant impact on enterprise cybersecurity and data governance …

phishing
Analyzing phishing attacks against 500,000 mailboxes at 100 organizations

Phishing has evolved from a mere nuisance into a global epidemic in which organizations of all sizes and across all industries are being negatively impacted at high frequency. …

building
4 vectors transforming the security software market

The security software market is undergoing a transformation due to four key developments, according to Gartner. The use of advanced analytics, expanded ecosystems, adoption of …

vault
First post-quantum cryptography on a contactless security chip

Due to their computing power, quantum computers have the disruptive potential to break various currently used encryption algorithms. Infineon Technologies has successfully …

idea
5 incident response practices that keep enterprises from adapting to new threats

Security analysts within enterprises are living a nightmare that never ends. 24 hours a day, their organizations are being attacked by outside (and sometimes inside) …

GDPR
Companies struggling to meet GDPR standards

A new survey conducted by Vanson Bourne asked IT leaders in the U.S., UK, Germany and France about their current data policies to see how well aligned they are with the EU …

abstract
Week in review: Hacking through subtitles, new class of attacks against Android

Here’s an overview of some of last week’s most interesting news and articles: How to build a better SOC team There’s no scarcity of discussion around the reasons …

clock
As GDPR deadline looms, time for compliance is running out

GDPR is a game-changing piece of data protection legislation that goes into effect on May 25, 2018. While the legislation includes various components related to how …

Car
Guidance for connected vehicle security: Attack vectors and impacts

The Cloud Security Alliance (CSA) released its first ever research and guidance report on connected vehicle security. Authored by the CSA’s Internet of Things (IoT) …

construction
How to build a better SOC team

The security skills shortage is a very real issue. Cisco estimates that there are currently one million unfilled cyber security jobs worldwide, while a report from Frost …

signal
Wi-Fi holography: Generate a 3D image of space using stray Wi-Fi signals

Scientists at the Technical University of Munich (TUM) have developed a holographic imaging process that depicts the radiation of a Wi-Fi transmitter to generate …

money
Disconnect between investment and expected security improvements

Less than half of US firms will increase their investment in cybersecurity protection to match an expected rise in data breaches, according to a new survey conducted by Ovum. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools