Please turn on your JavaScript for this page to function normally.
Verify you are human
Windows users targeted with fake human verification pages delivering malware

For a while now, security researchers have been warning about fake human verification pages tricking Windows users into inadvertently installing malware. A recently exposed …

email attacks
Security measures fail to keep up with rising email attacks

Organizations must reassess their email security posture as incidents continue to escalate, leading to financial losses. Key findings reveal a significant increase in email …

HNS
Proofpoint expands platform capabilities for broader, adaptive human-centric security controls

Proofpoint has expanded capabilities across its platform to provide customers with broader, adaptive human-centric security controls. These new solutions and integrations …

HNS
Proofpoint helps organizations simplify governance of communication data

Proofpoint introduced its Digital Communications Governance (DCG) offering, bolstering its existing offerings in pace with the evolving modern data governance and enterprise …

HNS
Proofpoint launches NIST-inspired framework to tackle data loss prevention challenges

Proofpoint launched a proprietary, partner-friendly, end-to-end information protection framework, providing organizations access to expertise, industry benchmark data and …

burnout
The cost of cybersecurity burnout: Impact on performance and well-being

This article includes excerpts from recent reports we covered, providing statistics and insights into the levels of stress and burnout experienced by cybersecurity …

CISO
Valuable insights for making the right cybersecurity decisions

This article compiles excerpts from various reports, presenting statistics and insights that could be helpful for CISOs. CISOs becoming more comfortable with risk levels …

cybersecurity threats
Find out which cybersecurity threats organizations fear the most

This article compiles excerpts from various reports, presenting statistics and insights on cybersecurity threats faced by businesses and individuals alike. Cyber insurance …

malware
Malware peddlers love this one social engineering trick!

Attackers are increasingly using a clever social engineering technique to get users to install malware, Proofpoint researchers are warning. The message warns of a problem but …

botnet
Find out which cyber threats you should be concerned about

This article includes excerpts from various reports that offer statistics and insights into the current cyber threat landscape. Human error still perceived as the Achilles’ …

Infosec products of the month
Infosec products of the month: May 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Abnormal Security, Adaptive Shield, Appdome, AuditBoard, Calix, Cranium, CyberArk, …

strategy
Human error still perceived as the Achilles’ heel of cybersecurity

While fears of cyber attacks continue to rise, CISOs demonstrate increasing confidence in their ability to defend against these threats, reflecting a significant shift in the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools