Please turn on your JavaScript for this page to function normally.
identity theft
Cyber attribution: Vigilance or distraction?

Cyber attribution is a process by which security analysts collect evidence, build timelines and attempt to piece together evidence in the wake of a cyberattack to identify the …

Kubernetes
So, you want to deploy air-gapped Kubernetes, huh?

So, you want to deploy Kubernetes in an air-gapped environment, but after months of grueling work, you’re still not up and running. Or maybe you’re just embarking on the …

Code
Best practices for securing the software application supply chain

As server-side security advances, more attackers are exploiting vulnerabilities and launching malicious attacks through the less protected and seldom monitored client-side …

fix
We can’t wait for SBOMs to be demanded by regulation

Old ads can be startling—cigarette ads used to boast their health-giving properties, sugar-laden candy was once advertised as a dietary aid, and soft drinks were advertised as …

Permit.io
Product showcase: Permit.io – Application-level permissions with a no-code UI

Managing user access in applications has always been a headache for any developer. Implementing policies and enforcing them can prove to be quite complex, and very …

ChatGPT
The rise of AI threats: Is your business prepared to face ChatGPT?

Skyhigh Security has seen firsthand how 33,000 enterprise users have accessed ChatGPT through corporate infrastructures. Almost 7 TB of data has been transacted with ChatGPT …

airport security
TSA issues additional cybersecurity rules for the aviation sector

The Transportation Security Administration (TSA) issued a new cybersecurity amendment to the security programs of certain TSA-regulated (airport and aircraft) operators in the …

fraud detection
Fighting financial fraud through fusion centers

Keeping up with financial fraud is incredibly difficult because accurate fraud detection requires a deep, real-time analysis of all the events surrounding a transaction. …

world
The cybersecurity landscape in the era of economic instability

Economic uncertainty is squeezing organizations globally. Gartner predicts nearly half of cybersecurity leaders will change jobs by 2025. These findings are alarming but …

Password
Young government workers show poor password management habits

Hybrid work has exposed another area of vulnerability, with 70% of government workers reporting they work virtually at least some of the time, according to Ivanti. The …

Google One
Google One expands security features to all plans with dark web report, VPN access

Google One unveiled two exciting additions to its range of features. Firstly, VPN by Google One will now be available to all plans, offering additional security while carrying …

dev
Massive GitHub analysis reveals 10 million secrets hidden in 1 billion commits

GitGuardian scanned 1.027 billion new GitHub commits in 2022 (+20% compared to 2021) and found 10,000,000 secrets occurrences (+67% compared to 2022). What is interesting …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools