Please turn on your JavaScript for this page to function normally.
AI
Why we can’t put all our trust into AI

According to theoretical physicist Michio Kaku, “The human brain has 100 billion neurons, each neuron connected to 10,000 other neurons. Sitting on your shoulders is the most …

malware
Stealthy Excel malware putting organizations in crosshairs of ransomware gangs

The HP Wolf Security threat research team identified a wave of attacks utilizing Excel add-in files to spread malware, helping attackers to gain access to targets, and …

fist
What makes achieving cyber resilience difficult?

Anomali published a report which provides visibility into the current threat landscape, reveals the top challenges to establishing a resilient cybersecurity posture, and …

account
65% of organizations continue to rely on shared logins

As organizations look to embrace modern approaches to security in 2022, a strongDM survey has revealed that access management is one of the most crucial factors to achieving …

open source
Open-source code: How to stay secure while moving fast

Open source has transformed the software world, tremendously reducing the cost of introducing new technology by enabling broad reuse across products and industries. However, …

Runecast
Product showcase: CIOs can optimize and secure hybrid IT environments with Runecast

As cybersecurity and regulatory compliance become the two largest concerns of corporate boards (Gartner, 2021), many organizations are adding cybersecurity experts …

idea
Proactive software supply chain security becoming critical as threats rise

Anchore released its report of executive insights into managing enterprise software supply chain security practices. The Anchore 2022 Software Supply Chain Security Report …

brain
How to achieve greater cyber resiliency

Spurred on by economic shutdowns, cyber criminals have become more cunning and brazen than ever before, executing ransomware attacks against organizations of all sizes across …

Darren Siegel
Strong security starts with the strengthening of the weakest link: passwords

Darren Siegel is a cyber security expert at Specops Software. He works as a lead IT engineer, helping organizations solve complex challenges within IT security. In this …

cloud complexity
Why organizations should consider adopting cloud governance as code

Cloud governance, in terms of enforcing cost, compliance, and security policies tends to be a pivotal inhibitor to cloud adoption (86% of the respondents) and is a top …

remote work
How do IT leaders plan to overcome remote work security challenges?

Two years ago, IT leaders were forced into remote work. Many viewed it as a temporary experiment. Today, they see it for what it is: the future of work. And they’ve made it …

magnifying glass
Cybersecurity industry trends from 2021 bound to shape this year’s threat landscape

Bugcrowd released its report to spotlight the key cybersecurity trends from 2021, including the rise in the adoption of crowdsourced security due to the global shift to hybrid …

Don't miss

Cybersecurity news