cybersecurity

OSI Layer 1: The soft underbelly of cybersecurity
As traditional cybersecurity solutions improve, they push cyberattackers toward alternative paths. Layer 1 of the OSI model (i.e., the physical layer) has become a fertile …

IT teams forced into compromising security for business continuity during pandemic
IT teams have been forced into compromising security for business continuity at a time of rising threats, a HP report reveals. Making matters worse, their attempts to increase …

Only 30% of enterprises use cloud services with E2E encryption for external file sharing
A recent study of enterprise IT security decision makers conducted by Tresorit shows that majority of enterprises use additional encryption methods to boost the security of …

Enterprise automation adoption surging, security and compliance area jump by 171%
Workato unveiled a data report focused on the key trends that shaped automation over the past year. The anonymised data reveals major shifts in automation priorities as …

Network security market growth driven by remote work popularity and security needs
Frost & Sullivan’s recent analysis of the Asia-Pacific (APAC) network security (NWS) market finds that the increasing acceptance of remote work and adoption of …

September 2021 Patch Tuesday forecast: It’s new operating system season
Summer vacations are coming to a close and, for many, the children are finally going back to school providing some quiet time. I hope everyone is well rested because the fall …

A zero-trust future: Why cybersecurity should be prioritized for the hybrid working world
The pandemic has had a significant impact on the way we work, and one of our recent research studies found that nearly 65% of companies expect some or all their workforce to …

SIEM market size to reach $6436.2 million by 2027
The global security information and event management (SIEM) market size is projected to reach $6436.2 million by 2027, from $3938.3 million in 2020, at a CAGR of 6.8% during …

The role of automation in staying on top of the evolving threat landscape
In this interview with Help Net Security, Dr Shreekant Thakkar, Chief Researcher, Secure Systems Research Centre at TII, talks about the ever evolving threat landscape and how …

Organizations struggling to develop cloud applications that meet security requirements
According to a Security Compass research, in mid-sized to large enterprises, 50% of the software applications being developed are cloud based, and another 30% are expected to …

Securing your WordPress website against ransomware attacks
It’s no surprise to anyone who works in security that there’s been an explosion in ransomware incidents over the last two years, costing companies across various industries …

The age of AI-powered devices at the edge
The vast amount of data constantly collected by the billions of sensors and devices that make up the IoT can pose a serious processing challenge for businesses that rely on …
Featured news
Resources
Don't miss
- ScreenConnect admins targeted with spoofed login alerts
- Fake macOS help sites push Shamos infostealer via ClickFix technique
- Why a new AI tool could change how we test insider threat defenses
- Why satellite cybersecurity threats matter to everyone
- Kopia: Open-source encrypted backup tool for Windows, macOS, Linux