Please turn on your JavaScript for this page to function normally.
server
The state of the cloud and the Software-Defined Data Center

We’ve long been moving toward cloud-based and virtualized infrastructures, but in some ways 2016 might just be the year in which the Software-Defined Data Center (SDDC) really …

Vivaldi
Opera Software founder launches Vivaldi, a new browser

After more than one year in public development and millions of downloads, Vivaldi today released the first major release of its desktop browser: Vivaldi 1.0. The UI uses React …

Businessman
Take it to the boardroom: Elevating the cybersecurity discussion

As data breaches continue to rise, organizations, regardless of their size or industry they are in, must take into consideration a new mindset. Despite the FBI’s focus on …

glass building
Does hybrid IT offer a competitive advantage?

Hybrid IT is about more than saving money. A survey of IT decision-makers at major financial services, retail, health care, and other organizations found that 50 percent have …

money
Calculate the cost and probability of a DDoS attack

DDoS attacks are becoming increasingly larger, more complex, and perpetrated by cyber extortionist instead of hacktivists and vandals, according to a recent survey from Arbor …

danger
The dangers of bad cyber threat intelligence programs

I love a surprise ending in a movie. Whether I’m watching drama, action, or sci-fi, there’s nothing better than a plot twist you can’t predict. At work, however, I feel the …

authentication
Global IAM market to reach 24.55 billion by 2022

The global identity and access management (IAM) market is expected to reach USD 24.55 billion by 2022, according to Research and Markets. Increased spending by large scale …

world in hand
Week in review: Hackers breaching law firms, ransomware flare-up, and how to get your talk accepted at Black Hat

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Hackers breaching law firms for insider trading info Two of the most …

Lock
Encryption we can trust: Are we there yet?

Encryption is arguably the most important single security tool that we have, but it still has some serious growing up to do. The current debate about the pros and cons of …

target
SMEs under attack, security readiness still low

When it comes to securing their data, SMEs remain several steps behind their larger counterparts. Some reasons for the disparity in security readiness may be that SMEs have …

iPhone
SideStepper vulnerability can be used to install malicious apps on iOS

Check Point researchers have identified SideStepper, a vulnerability that can be used to install malicious apps on iPhones and iPads to steal login credentials and sensitive …

Money
Consumers living in smart homes are willing to sell personal data

A majority of respondents worldwide might be willing to share their personal data collected from their smart home with companies in exchange for money, and 70 percent agree …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools