What makes some organizations more cyber resilient than others?
Despite higher levels of investment in advanced cybersecurity technologies over the past three years, less than one-fifth of organizations are effectively stopping …
                                Layering diverse defenses is crucial for stopping email attacks
Despite heading a company that provides a technological solution for stopping targeted email attacks, Evan Reiser, CEO of Abnormal Security, knows that technology is not the …
                                Three principles regarding encryption you need to keep in mind
Encryption is a popular topic among security professionals and occasionally a polarizing one. Plenty of misconceptions surround the process, and these often skew the way …
                                How to prioritize IT security projects
If you’re an IT security professional, you’re almost certainly familiar with that sinking feeling you experience when presented with an overwhelming number of …
                                2019 saw more data breaches, fewer sensitive records exposed
According to a new Identity Theft Resource Center report, the number of U.S. data breaches tracked in 2019 (1,473) increased 17 percent from the total number of breaches …
                                2020: A year of deepfakes and deep deception
Over the past year, deepfakes, a machine learning model that is used to create realistic yet fake or manipulated audio and video, started making headlines as a major emerging …
                                Data breach: Why it’s time to adopt a risk-based approach to cybersecurity
The recent high-profile ransomware attack on foreign currency exchange specialist Travelex highlights the devastating results of a targeted cyber-attack. In the weeks …
                                52% of companies use cloud services that have experienced a breach
Seventy-nine percent of companies store sensitive data in the public cloud, according to a McAfee survey. Anonymized cloud event data showing percentage of files in the cloud …
                                Recommendations for navigating the dynamic cybercrime landscape
In this interview, Mark Sangster, VP & Industry Security Strategist at eSentire, talks about the most pressing issues CISOs are dealing with in today’s fast-paced …
                                CISOs: Make 2020 the year you focus on third-party cyber risk
While cybersecurity professionals are certainly aware of the growing threat posed by sharing data with third parties, many seem to lack the urgency required to address this …
                                Zero Trust: Beyond access controls
As the Zero Trust approach to cybersecurity gains traction in the enterprise world, many people have come to recognize the term without fully understanding its meaning. One …
                                There is no easy fix to AI privacy problems
Artificial intelligence – more specifically, the machine learning (ML) subset of AI – has a number of privacy problems. Not only does ML require vast amounts of data for …
Featured news
Resources
Don't miss
- How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military