Please turn on your JavaScript for this page to function normally.
Microsoft logo
New, improved Microsoft 365 security and compliance features

Microsoft has announced a number of enhancements to help its business and enterprises customers improve security and compliance efforts. Among these is a new solution for …

road
Key predictions that will impact CIOs and IT pros over the next five years

Time for action is growing short for CIOs in the digital era. Many continue to struggle with siloed digital transformation initiatives, leaving them adrift and buffeted by …

money
Security services and network security still top spending priorities for CISOs in MENA

Middle East and North Africa (MENA) enterprise information security and risk management spending will total $1.7 billion in 2020, an increase of 10.7% from 2019, according to …

Office 365
Office 365 users targeted with fake voicemail alerts in suspected whaling campaign

Office 365 users at high-profile companies in a wide variety of industries are being targeted with voicemail-themed phishing emails, McAfee researchers have found. They say …

Microsoft Windows
Most IT pros still haven’t migrated all their users to Windows 10

59% of IT professionals report that they still haven’t migrated all their users to Windows 10, despite the imminent end of regular support for Windows 7 on January 14, 2020, …

G Suite
G Suite admins get context-aware access controls, rule-based automated actions and alerts

Google is rolling out new security capabilities for G Suite Enterprise administrators, allowing them to implement context-aware access controls for users and to create rules …

shark
Is the enterprise on the brink of a global web supply chain attack?

Ever since the Web development ecosystem evolved to the current paradigm of code reuse, companies have placed themselves too close to the abyss. Web supply chain attacks are a …

search
Investigations are an unfortunate fact of life for most corporations

Corporate investigations, which can be triggered by any number of events, have become a fact of life for most companies, according to a survey from H5. The survey focused on …

businessman
CIO role remains critical in leading enterprises through crises and transformations

The march to digitalization is so commonplace today that 40% of global CIOs have reached scale for their digital endeavors, more than doubling the proportion of enterprises …

email
Phishing attacks are a complex problem that requires layered solutions

Most cyberattacks start with a social engineering attempt and, most often than not, it takes the form of a phishing email. It’s easy to understand the popularity of this …

Lock
Top five tips for building smarter enterprise security

ExtraHop is offering tips and strategies for enterprise organizations to improve their security posture across hybrid and cloud workloads. Below are tips for building smarter …

Cisco wireless
Cisco fixes serious flaws in enterprise-grade Catalyst and Aironet access points

Cisco has released another batch of security updates, the most critical of which fixes a vulnerability that could allow unauthenticated, remote attackers to gain access to …

Don't miss

Cybersecurity news