cybersecurity

Tech companies fret over data privacy, but ready to bet on IPO market
Cybersecurity concerns, along with U.S. economic growth, are the two top drivers anticipated to spur overall U.S. tech industry growth in 2019. Data privacy remains at the …

The risks associated with the influx of unauthorized collaboration tools
A majority (82 percent) of end-users are pushing back on IT or management when the company tries to dictate which collaboration tools should be used. But IT is standing its …

How are businesses facing the cybersecurity challenges of increasing cloud adoption?
Cloud services serve core functions essential to all aspects of business operations, but getting cloud security right is still a challenge for many organizations, the 2019 …

CISO’s guide to an effective post-incident board report
A successful cyberattack is undoubtedly one of the most disruptive events an organization can experience. Whether it’s phishing, DDoS, ransomware or SQL injection, the …

(ISC)² Secure Summit EMEA will welcome hundreds of the best minds in cybersecurity
This year’s (ISC)² Secure Summit EMEA will take place in The Hague in April. In order to find out what elements set this event apart from other cybersecurity events, we …

Formjacking is the new get rich quick scheme for cybercriminals
Faced with diminishing returns from ransomware and cryptojacking, cybercriminals are doubling down on alternative methods, such as formjacking, to make money according to …

Prevent shadow IT: Companies need security covering multiple communication vectors
There is a critical need for companies to adopt comprehensive and secure enterprise communications platforms to prevent shadow IT. It is a phenomenon where employees, to …

Ryuk: What does the helpdesk tell us?
Cybercrime is the only criminal channel that provides a helpdesk. An amusing side note in the world of digital crime, and whilst considerable efforts have been taken to …

Insights on modern adversaries and their tactics, techniques, and procedures
In today’s ever-evolving cyber landscape, speed is essential for effective cyber defense. CrowdStrike’s Global Threat Report reveals “breakout time” – the critical window …

European standards org releases consumer IoT cybersecurity standard
The European Telecommunications Standards Institute (ETSI) has released ETSI TS 103 645, a standard for cybersecurity in the Internet of Things, to establish a security …

IT security incidents affecting German critical infrastructure are on the rise
The number of IT security incidents reported by critical infrastructure companies in Germany has soared. In 2017, the German Federal Office for Security in Information …

Building security into cloud native apps with NGINX
Companies like Airbnb, Uber and DoorDash, which have a cloud-based software infrastructure as one of their main enablers, are disrupting the hospitality, transportation and …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025