Please turn on your JavaScript for this page to function normally.
bomb
Ransomware, supply chain, and deepfakes: The top threats the finance industry needs to prepare for

The finance industry is constantly targeted by numerous threat actors, and they are always innovating and trying new techniques (such as deepfakes) to outsmart security teams …

encryption
Eight resolutions to help navigate the new hybrid office model

Continuous review and improvement are crucial for a successful security program. As this year draws to a close, it is a good time to look back on 2021 and prepare a few …

energy
Why the UK’s energy sector is fragile and ripe to cyber attacks

For the first time in a generation, the UK is in the middle of an unprecedented supply chain crisis, and in recent weeks, we have seen very clearly the immediate and …

IoT connection
Your supply chain: How and why network security and infrastructure matter

With digital transformation, the rapid adoption of cloud computing and the IoT, and the global scale of today’s supply chains, cybercriminals have more entry points to …

open source
Securing open-source code supply chains may help prevent the next big cyberattack

The headline-making supply chain attack on SolarWinds late last year sent a shock wave through the security community and had many CISOs and security leaders asking: “Is my …

gift
As the holiday season approaches, threats to supply chain, e-commerce and travel soar

During the pandemic, 81% of global organizations experienced increased cyber threats with 79% experiencing downtime due to a cyber incident during a peak season, McAfee and …

Dependency Combobulator
Dependency Combobulator: Open source toolkit to combat dependency confusion attacks

Apiiro released Dependency Combobulator, a modular and extensible open source toolkit to detect and prevent dependency confusion attacks. The toolkit, available on GitHub, …

stop
Organizations losing business due to connected product security concerns

59% of executives with cybersecurity decision-making responsibility at large and mid-sized companies say that their organizations have lost business due to product security …

business
Corporate attack surface exploding as a result of remote work

74% of organizations attribute recent business-impacting cyberattacks to vulnerabilities in technology put in place during the pandemic. The data is drawn from a study of more …

open source
Open source cyberattacks increasing by 650%, popular projects more vulnerable

Sonatype released a report that revealed continued strong growth in open source supply and demand dynamics. Further, with regard to open source security risks, the report …

IoT
IoT interest is growing, but so are cybersecurity concerns

Enterprises across the globe are showing renewed interest in the Internet of Things (IoT) and the Industrial Internet of Things (IIoT), and they are looking to service …

White House
The cybersecurity metrics required to make Biden’s Executive Order impactful

For too long, both the private and public sectors have not prioritized cybersecurity efforts enough and only acted in “good faith” – an inadequate effort to improve …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools