Please turn on your JavaScript for this page to function normally.
gap
Avoiding the next breach: Four tips for securing your apps

As security incidents continue to be an ongoing threat to businesses on a daily basis, keeping security procedures up-to-date and avoiding the next breach have become …

network
How DNS filtering works and why businesses need it

The Domain Name System (DNS) is a cornerstone of the internet. DNS servers connect URL names that humans can read to unique Internet Protocol (IP) addresses that web browsers …

build
Supply chain examination: Planning for vulnerabilities you can’t control

Seemingly, there are numerous occurrences when the customer’s personally identifiable information stored by an organization’s third-party provider is set loose by malicious …

secure
Prevent credential stuffing and account takeover attacks with these expert tips

Account takeover and credential stuffing attacks are two security threats that often go hand in hand. Both have become alarmingly prominent: a recent report found that …

5G
5G IoT security: Opportunity comes with risks

Slowly but surely, 5G digital cellular networks are being set up around the world. It will take years for widespread coverage and use to be achieved, so what better time than …

cybersecurity company benefits
Cybersecurity company benefits should reduce stress but don’t

From start-ups to Silicon Valley giants, tech company employees work in some of the most luxurious offices in the world, especially as the best of businesses battle to attract …

working
Pain points for CTOs: A primer of the most stressful aspects of the job

The role of chief technology officer is evolving quickly because of the current spate of technology and its development. Not so long ago, CTOs focused heavily on IT operations …

idea
Five cybersecurity certifications that provide value to employers

The cybersecurity skills gap and talent shortage continue to widen year over year as the result of a proverbial square peg and round hole situation. The peg: prospective …

online shopping
How can financial institutions prevent shopping season fraud?

Black Friday and Cyber Monday are two of the years’ busiest shopping days. For consumers and retailers alike, it marks the beginning of the winter holiday shopping season, as …

crowd
There’s no way to fill the data skills gap, what now?

A recent survey of 100 UK CIOs found that 76% are worried about recruiting the IT staff they need to remain competitive. They’re right to be worried. The European Commission …

risk
The overlooked part of an infosec strategy: Cyber insurance underwriting

When a data breach or cyber attack hits the headlines one of the last things businesses are likely to consider is how cyber insurance could helped. Outside of a general …

zero
Preventing insider threats, data loss and damage through zero trust

With the proliferation of mobile devices and BYOD, ubiquitous and always available internet connectivity and the widespread use of private, public and hybrid cloud solutions, …

Don't miss

Cybersecurity news