Please turn on your JavaScript for this page to function normally.
connected car
Are we doing enough to protect connected cars?

Even though connected cars should meet the highest level of security, safety, and performance, we know this is not always the case. In this interview, Moshe Shlisel, CEO at …

Zoom
Zoom in crisis: How to respond and manage product security incidents

Zoom is in crisis mode, facing grave and very public concerns regarding the trust in management’s commitment for secure products, the respect for user privacy, the honesty of …

Patch Tuesday
April 2020 Patch Tuesday: Microsoft fixes three actively exploited vulnerabilities

For the April 2020 Patch Tuesday, Adobe plugs 5 flaws and Microsoft 113, three of which are currently being exploited by attackers. Adobe’s updates On this Patch …

Zoom
Will Zoom manage to retain security-conscious customers?

While Zoom Video Communications is trying to change the public’s rightful perception that, at least until a few weeks ago, Zoom security and privacy were low on their …

Think
The dangers of assumptions in security

Assuming things is bad for your security posture. You are leaving yourself vulnerable when you assume what you have is what you need, or what you have is working as …

compliance
GDPR, CCPA and beyond: How synthetic data can reduce the scope of stringent regulations

As many organizations are still discovering, compliance is complicated. Stringent regulations, like the GDPR and the CCPA, require multiple steps from numerous departments …

cloud
Shift to work-from-home: Most IT pros worried about cloud security

As most companies make the rapid shift to work-from-home to stem the spread of COVID-19, a significant percentage of IT and cloud professionals are concerned about maintaining …

talk
A worrisome increase in call traffic from fraudsters exploiting the pandemic

There’s a worrisome increase in call traffic from bad actors looking to cash in on new vulnerabilities created by the global COVID-19 pandemic, according to research …

laptop
When your laptop is your workspace, the real office never closes

With the COVID-19 pandemic, working from home has moved from a company perk to a hard requirement. Social distancing government mandates have forced complete office closures …

mobile work
Small businesses unprepared for remote working, most don’t provide cybersecurity training

Stay-at-home orders for more than 40 states have forced millions of businesses to establish remote workforces that rely solely on internet-enabled applications and products to …

cloud
You have to consider cybersecurity at all points of a cloud migration

Human error and complex cloud deployments open the door to a wide range of cyber threats, according to Trend Micro. Cloud security issues Gartner predicts that by 2021, over …

PKI
10 considerations in order to ensure business continuity for PKI

Every year, enterprises face unforeseen events that can disrupt operations. These events are rarely predictable and often create significant challenges for IT and security …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools