Please turn on your JavaScript for this page to function normally.
ukraine attacks
Four key risks exacerbated by Russia’s invasion of Ukraine

Russia’s invasion of Ukraine has altered the emerging risk landscape, and it requires enterprise risk management (ERM) leaders to reassess previously established …

shark
Are you willing to take a calculated risk? Quantifying your cyber risk and predicting future threats

We can all agree that cyber attacks are inevitable. The next step for cybersecurity professionals is reaching a consensus on the best way to prepare for unknown threats …

fix
The importance of building in security during software development

Checkmarx released the UK findings of its report which found that 45% of organizations have suffered at least two security breaches as a direct result of a vulnerable …

electric vehicle
Small business owners worried about the cybersecurity of their commercial vehicles

Small business owners are adding electric vehicles to their service fleets, a survey released by HSB reports, but they worry about cybersecurity when connecting them to public …

ecommerce
Fraud detection and prevention costs merchants more than fraud itself

European merchants spent nearly €7 billion on fraud detection and prevention in 2021 alone – more than three times the value lost to fraud in the same year, CMSPI estimates. …

Terminal
Solving the problem of secrets sprawling in corporate codebases

GitGuardian announced the results of its report which extends its previous edition focused on public GitHub by depicting a realistic view of the state of secrets sprawl in …

identity theft
Look out for identity theft and fraud crimes as tax season begins

Now more than ever, life happens online. But, with greater connectedness comes enhanced risk. Millions of Americans fall victim to identity theft and fraud each year, …

Critical infrastructure
Lack of visibility plaguing ICS environments

Dragos released its report on cyber threats facing industrial organizations, naming the emergence of three new threat groups targeting ICS/OT environments, including two that …

IoT
IoT security is foundational, not optional

A PSA Certified report predicts that this year will mark a turning point in securing the Internet of Things (IoT), as the industry collectively commits to addressing the …

endpoint protection
Devastating breaches apparently still not enough for organizations to prioritize endpoint security

Action1 released a report based on feedback from 491 IT professionals worldwide. The study explores the extent to which organizations plan to prioritize endpoint security and …

ecommerce
The impact of API security on how consumers view brands

ThreatX released the results of a survey which highlights the risk of API attacks on the consumer experience. Nearly every software application and mobile application uses, or …

data
To shift to data-driven security decision making: Start with the right data

We live in the age of data-driven everything. From sales to operations, and everything in-between, today’s organizations are constantly looking for ways to leverage the data …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools