Please turn on your JavaScript for this page to function normally.
bomb
50% of organizations believe attackers can infiltrate their networks each time they try

As organizations increase investments in automation and agility, a general lack of awareness about the existence of privileged credentials – across DevOps, robotic process …

brain
How AI can improve user experience and security for the finance industry

For the last 50 years, the fundamental and largely unchanged model for identifying and authenticating users has been based on the combination of a username and password, …

Face paint
Tricking attackers through the art of deception

In cybersecurity, deception is redundant if it cannot fulfill its critical aim – to misdirect, confuse, and lure attackers into traps and dead-ends. It is the art of tricking …

puzzle
Security or compliance? Stop choosing between them

The difference between security and compliance is more than just process. It’s philosophy and practice. Compliance can be one tactical execution of a great security strategy …

servers
Enterprises adopt edge workloads, yet still use unsuitable legacy storage solutions

By 2025 organizations will churn out 175 zetta-bytes of data, IDC predicts. However bottlenecks and compute problems continue to plague IT pros as they struggle to support …

Equifax
What you should know about the Equifax data breach settlement

Equifax has agreed to pay at least $575 million, and potentially up to $700 million, as part of a global settlement with the Federal Trade Commission, the Consumer Financial …

Healthcare IoT
Healthcare’s blind spot: Unmanaged IoT and medical devices

From imaging to monitoring systems, infusion pumps to therapeutic lasers and life support machines, medical devices are used to improve and streamline patient care. Many of …

editor
Securing modern web apps: A case for framework-aware SAST

If you were to write a web application entirely by yourself, it would be a rather daunting task. You would need to write the UI elements from lower-level APIs, set up and …

burn
How DNS firewalls can burn security teams

It’s easy to see how DNS firewalls could have thwarted 33% of data breaches. For most IT and security teams, DNS has been an afterthought. Or, worse, not even that. The …

People
Business owners prioritize investment in technology over upskilling

Business owners say their strategy is to prioritize investing in technology (52%) over upskilling (24%) their workforce, according to Adecco. The research titled, People, …

identity
True passwordless authentication is still quite a while away

The password has been one of the great inventions in the history of computing: a solution that allowed simple and effective identity and access management when the need arose …

SD-WAN
Skills gap remains a top barrier to SD-WAN adoption

SD-WAN security drives selection, skills gaps remain a primary obstacle to adoption, and adoption continues to rise, according to Masergy. The survey, conducted in partnership …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools