Please turn on your JavaScript for this page to function normally.
brain
How security leaders can build emotionally intelligent cybersecurity teams

How a leader motivates their team, gathers, and uses information, makes decisions, manages change initiatives, and handles crises is referred to as “leadership style”, and is …

lock
Confidence redefined: The cybersecurity industry needs a reboot

I’m sure many of us would like to leave 2020 behind and get back to our “normal” lives but, in some areas, I think that would be a mistake. Despite the challenges and …

red
Where does the SME fit into a supply chain attack?

“No business is an island, entire of itself” (with apologies to John Donne). Businesses have connections to other businesses, who supply them with goods, and whom they supply …

Trending cybercrimes and the big impact of lesser-known breaches

Sontiq released the Mid-Year 2021 Cybercrime Report, which highlights five key trends and the 2021 data breaches that pose the highest level of risk to victims. Companies are …

bomb
Exposing the latest cloud threats affecting enterprises

Netskope revealed new research showing the continued growth of malware delivered by cloud applications and also the potential for critical data exfiltration tied to employees …

user
Consumers are increasingly concerned about online security and imminent attacks

According to a new Sophos Home survey, forty-five percent of consumers say they’re more at risk of being hit by an attack now than they were before the pandemic, and 61% …

cloud
36% of organizations suffered a serious cloud security data leak or a breach in the past year

As cloud adoption accelerates and the scale of cloud environments grows, engineering and security teams say that risks—and the costs of addressing them—are increasing. The …

glasses
CISOs operating blind, with limited visibility and control

An overwhelming percentage (75%) of CISOs consider their organization to be at greater risk of a cybersecurity attack due to the transition to home working, with a third …

identity
Consumer attitudes towards various digital identity authentication methods

With concerns around online fraud and identity theft rising, consumers expect businesses to utilize new technologies to protect them online. According to research from …

account
Verifiable credentials are key to the future of online privacy

To realize the full potential of online services, identity verification solutions are required to avoid fraud and boost trust in the systems, for both end users and …

Terminal
Ignore API security at your peril

Application programming interfaces (APIs) are at the core of nearly every digital experience – whether that is the delivery of mobile apps that enable consumers to …

container
The knowledge gap around runtime security and the associated risks

According to Aqua Security’s 2021 Cloud Native Security Practitioner study, only 3% recognize that a container, in and of itself, is not a security boundary, indicating …

Don't miss

Cybersecurity news