cybersecurity
High profile incidents and new technologies drive cybersecurity M&A to record highs
The Cybersecurity M&A Market Report from international technology mergers and acquisitions advisors, Hampleton Partners, outlines how high profile hacks, the global …
An integrated approach helps companies improve operational resilience
By taking a unified approach to managing critical events (i.e. extreme weather, violence, supply chain disruption), businesses can significantly reduce the impact on employee …
Supply chain compromise: Adding undetectable hardware Trojans to integrated circuits
Is it possible for attackers to equip integrated circuits with hardware Trojans that will not change the area or power consumption of the IC, making them thus indiscernible …
Consumers still put trust in big brands despite breaches
Janrain conducted a survey to better understand how consumers really feel about brands in the wake of so many breaches. The company polled 1,000 UK adults and found that most …
Not all data collection is evil: Don’t let privacy scandals stall cybersecurity
Facebook continues to be criticized for its data collection practices. The media is hammering Google over how it handles data. JPMorgan Chase & Company was vilified for …
How can businesses get the most out of pentesting?
More than 4.5 billion data records were compromised in the first half of this year. If you still feel like your enterprise is secure after reading that statistic, you’re one …
December Patch Tuesday forecast: Let it snow, let it snow, let it snow
Grab your shovels, dust off the snow blower, and bundle up. The way patches are accumulating this month is making me think of winter in Minnesota. I’m talking about the kind …
Half of management teams lack awareness about BPC despite increased attacks
Trend Micro revealed that 43 percent of surveyed organizations have been impacted by a Business Process Compromise (BPC). Despite a high incidence of these types of attacks, …
An introduction to deception technology
This article is first in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides …
Measuring privacy operations: Use of technology on the rise
Critical privacy program activities such as creating data inventories, conducting data protection impact assessments (DPIA), and managing data subject access rights requests …
Consumers believe social media sites pose greatest risk to data
A majority of consumers are willing to walk away from businesses entirely if they suffer a data breach, with retailers most at risk, according to Gemalto. Two-thirds (66%) are …
Situational awareness: Real-time decision making to improve business operations
Although the term situational awareness usually pertains to the military and first responder space, it also plays a crucial role in the efficiency of public and private …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down