cybersecurity
The rise of modern applications, DevSecOps and the intelligence economy
There has been a significant year-over-year growth in enterprise usage trends around multi-cloud adoption, open source technologies such as Kubernetes, and AWS cloud-native …
Security leaders lack confidence in the supply chain, fear third-party attacks
An overwhelming number of cybersecurity professionals (89%) have expressed concerns about the third-party managed service providers (MSPs) they partner with being hacked, …
Interacting with governments in the digital age: What do citizens think?
Most U.S. citizens acknowledge and accept that state and local government agencies share their personal data, even when it comes to personal information such as criminal …
Cyber risk assessment of U.S. election commissions finds critical areas for improvement
Many election commissions are focused on quickly adapting and updating their cybersecurity; however, commissions still need to dedicate resources to updating outdated …
Simjacker vulnerability actively exploited to track, spy on mobile phone owners
Following extensive research, AdaptiveMobile Security has uncovered a new and previously undetected vulnerability. This vulnerability is currently being exploited and is being …
How to navigate critical data security and privacy policy challenges
By 2020, there will be 40x more bytes of data than there are stars in the universe as we know it. And with data growth comes more security and privacy obstacles for …
Security holding back employers from meeting employees’ remote working expectations
Less than a third (32%) of UK workers are allowed to work remotely whenever they want, according to research from Capita which uncovers employee attitudes to remote/flexible …
Review: Cyberdanger
Whether you’re already familiar with cybersecurity or want to educate yourself on the topic, Cyberdanger is a great read. The author, Eddy Willems, is a well-known expert in …
IoT attacks increasing in the cyber underground
Cybercriminals from around the world are actively discussing how to compromise connected devices, and how to leverage these devices for moneymaking schemes, according to Trend …
More than 99% of cyberattacks rely on human interaction
Cybercriminals target people, rather than systems and infrastructure, to install malware, initiate fraudulent transactions, steal data, and more, according to Proofpoint. …
Shine a light on shadow IT to improve organizational resilience
Shadow IT is one of the biggest challenges facing organizations today. According to Gartner, by 2020, a third of all cybersecurity attacks experienced by enterprises will be …
The use of SOX-specific solutions has more than doubled since last year
There’s a growing demand for advanced technologies to streamline Sarbanes-Oxley Act (SOX) compliance, according to a survey released by the SOX & Internal Controls …
Featured news
Sponsored
Don't miss
- US exposes scheme enabling North Korean IT workers to bypass sanctions
- The importance of access controls in incident response
- Organizations struggle to defend against ransomware
- Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)
- Google fixes third exploited Chrome zero-day in a week (CVE-2024-4947)