Please turn on your JavaScript for this page to function normally.
person
Third party risk on the rise, risk mitigation still not a priority

Given today’s cyber security climate, it is no surprise that companies are wary of the risks associated with third party vendors. Unfortunately, these risks are only …

terrorist
Europol to get new powers to disrupt terrorists’ online presence

The EU police agency Europol is expected to gain new powers that will help it fight terrorism and cybercrime, thanks to new governance rules endorsed by Civil Liberties …

Arrows
Security startup confessions: Choosing a tech partner

My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

Living in a password free world in the modern enterprise

The era of password security in the modern enterprise is over. Passwords are dead. Let’s be honest. Passwords in the enterprise were never really that secure in the …

Europe
US companies need to gear up for new EU data privacy regulations

Thousands of American companies that do business in Europe directly or online with European customers will need to start reckoning with new EU data privacy regulations that …

lights
Week in review: Top 10 web hacking techniques, exploit kit targets Android devices

Here’s an overview of some of last week’s most interesting news, reviews and articles: US Supreme Court approves expansion of FBI hacking powers The US Supreme …

ISIS
Pro-ISIS hackers: Tactics, methodology and tools

While the threat that emanates from ISIS-inspired cyber attacks is of high concern, especially in light of the formation of a new United Cyber Caliphate composed of previously …

user
1 in 10 people have posed as someone else online

Our need for ease and convenience is putting our digital identities and security at risk. A new BehavioSec report finds that 37% of us have shared our personal security data …

The challenges of controlling IT complexity

IT teams overwhelmingly feel that today’s IT environments are very complex – and that growing complexity is making it more difficult for them to do their jobs successfully, …

key
Defend encrypted data from quantum computer threat

If an exotic quantum computer is invented that could break the codes we depend on to protect confidential electronic information, what will we do to maintain our security and …

magnify
Attackers use open source security tools for targeted cyberespionage

Kaspersky Lab researchers have uncovered a new trend among cyberespionage threat actors: instead of developing customized hacking tools or buying them from third-party …

binary
The inherent problems of the detection paradigm

An ongoing debate in the modern cybersecurity world is whether to detect or prevent cyberattacks. Although detection technologies are undoubtedly important tools in the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools