Please turn on your JavaScript for this page to function normally.
AI
The age of AI-powered devices at the edge

The vast amount of data constantly collected by the billions of sensors and devices that make up the IoT can pose a serious processing challenge for businesses that rely on …

encryption
Out with the old, in with the new: From VPNs to ZTNA

The VPN held an important role in the evolution of the internet, and for decades has supported businesses in securing their networks. VPNs have been used by businesses and …

Joe Slowik
Critical infrastructure today: Complex challenges and rising threats

Cyber attacks against critical national infrastructure are escalating. The ransomware hit on Colonial Pipeline was a clanging wake-up call for the public, but cybersecurity …

face
Previous employees with access to corporate data remain a threat to businesses

Offboarding employees securely is a key problem for business leaders, with 40% concerned that employees who leave a company retain knowledge of passwords that grant access to …

industrial
The cybersecurity of industrial companies remains low, potential damage can be severe

Positive Technologies released a research that examines information security risks present in industrial companies, the second-most targeted sector by cybercriminals in 2020. …

White House
The cybersecurity metrics required to make Biden’s Executive Order impactful

For too long, both the private and public sectors have not prioritized cybersecurity efforts enough and only acted in “good faith” – an inadequate effort to improve …

risk
Getting ahead of a major blind spot for CISOs: Third-party risk

For many CISOs and security leaders, it was not long ago that their remit focused on the networks and digital ecosystems for their organization alone. In today’s digital …

video call
Hybrid work is here to stay, but security concerns are high

As a rise in variants spurs new uncertainties around the COVID-19 pandemic, businesses around the globe are tasked with developing a long-term plan and work model, whether …

upload
File upload security best practices rarely implemented to protect web applications

Despite a marked increase in concerns around malware attacks and third-party risk, only 8% of organizations with web applications for file uploads have fully implemented the …

search
Checking for misconfigurations isn’t enough

Misconfiguration errors are often the main focus of security for cloud-native applications, and for good reason. Earlier this year, Hobby Lobby accidentally exposed 136 GB of …

SaaS
40% of SaaS assets are unmanaged, putting companies at risk for data leaks

DoControl announced a report which provides data-driven insights into the growing number of external and insider threats due to vast amounts of unmanageable data in today’s …

ransomware
22% of cybersecurity incidents in H1 2021 were ransomware attacks

Ransomware attacks made up 22% of all reported cybersecurity incidents in the first half of 2021, according to recent analysis by CybSafe. CybSafe analysed data from the …

Don't miss

Cybersecurity news