Please turn on your JavaScript for this page to function normally.
cloud
Top cloud infrastructure risks faced by real-world organizations

There’s an increased adoption of managed infrastructure services and the emergence of new cloud watering hole attacks, Accurics reveals. Of all violations identified, 23 …

Mask
10 COVID-19-related lessons for future-ready cybersecurity

In 2020, we experienced wave after wave of COVID-19 surges and watched failure after failure at practicing what we knew were effective preventative measures. Similarly, in …

shield
What behavioral experts can teach us about improving security

The “castle and moat” approach to protecting one’s domain was effective for centuries. At the start of the internet age, when a company’s greatest assets were physically …

WAF
Most security pros think a WAF is high maintenance

An organization’s web application firewall (WAF) is a critical line of defense in protecting proprietary and customer data, but the concern is that some organizations are …

servers
CXOs consider mainframe and legacy modernization a business priority

More than 70% of CXOs of global companies consider mainframe or legacy modernization a strategic business priority for the next three years, a Tata Consultancy Services survey …

XDR
Knowledge graphs: The secret of Google Search and now XDR

Wading through waves of alert noise to find real threats and manually connecting the dots to find context in real-time attacks are essential capabilities in today’s …

Hand
57% of vulnerabilities in 2020 were classified as critical or high severity

NIST logged more than 18,000 vulnerabilities in 2020, over 10,000 of which were critical or high severity – an all-time high. Redscan’s analysis looks beyond severity scores, …

Car
Cybersecurity risks connected to AI in autonomous vehicles

By removing the most common cause of traffic accidents – the human driver – autonomous vehicles are expected to reduce traffic accidents and fatalities. However, they may pose …

finance
CFOs are becoming catalysts of digital strategy

As the pandemic continues to challenge organizations worldwide, the role of chief financial officers (CFOs) has moved further beyond “economic guardians” of the enterprise to …

account
Credential spill incidents nearly doubled since 2016

The number of annual credential spill incidents nearly doubled from 2016 to 2020, according to F5 research. There was a 46% downturn in the number of spilled credentials …

risk
People are often the collateral damage of attacks on corporations

Thanks to cyberattacks making regular headlines in the news, it’s no secret that massive data breaches are a significant threat to organizations. However, a report from …

users
Collaboration is the key to a secure world-class sporting event

Securing any world-class event is a massive undertaking that requires teams of security professionals to coordinate with each other and constantly share information. I’ve seen …

Don't miss

Cybersecurity news