Please turn on your JavaScript for this page to function normally.
arrows
Shift to microservices and continuous software delivery puts pressure on DevOps observability

A Scalyr report, based on a survey of 155 software development practitioners, finds that organizations are shifting away from traditional, monolithic architectures, with …

biohazard
Cryptocurrency miners poised for continued growth

WatchGuard threat intelligence from Q1 2018 revealed that 98.8 percent of seemingly common Linux/Downloader malware variants were actually designed to deliver a popular …

privacy
Do you support employee digital monitoring programs?

Employers can implement effective cybersecurity that increases visibility, reduces insider threat risk, and that respects employees’ privacy while gaining their support, …

Microsoft PowerShell
91% of critical incidents involve known, legitimate binaries like PowerShell

Opportunistic threat actors are leveraging trusted tools, like PowerShell, to retrieve and execute malicious code from remote sources. According to eSentire, 91% of endpoint …

bot
Mobile is the new frontier for malicious bots

Distil Networks analyzed over 100 million mobile devices on its networks. The findings suggest that sophisticated cybercriminals and bot operators now implement a new …

chess
Confidence wavers in face of evolving cybersecurity threats

Webroot found that businesses in the U.S., U.K. and Australia are taking cybersecurity seriously – with almost 100 percent of respondents conducting some form of employee …

vintage computer
IT chiefs keep obsolete systems running just to keep data accessible

89 per cent of IT decision makers in UK enterprises admit they are keeping old or legacy applications alive just to keep the historical data accessible, according to a new …

DDoS
Bot-driven credential abuse, DDoS attacks continue to rise

Cybersecurity defenders face increasing threats from organisations in the form of bot-based credential abuse targeting the hospitality industry and advanced DDoS attacks, …

hand
Digital transformation: Insight into getting it right

If digital transformation (DX) is using digital technologies to create new business models and change markets, then the journey has only just begun, according to IDC. The …

bomb
Banking Trojans and cryptojacking on the rise

A new report analyzes threat data collected from approximately 750,000 Morphisec protected endpoints globally, between January 1 and March 31, 2018, as well as from in-depth …

Red door
Unrestricted access to systems and files exposes organizations to cybercrime

UK organisations are leaving themselves vulnerable to cybercrime with over a third of 18-24-year-olds able to access any files on their company network, and only one in five …

laptop
Endpoint security automation a top priority for IT pros

A new SANS Institute report found that automating endpoint detection and response processes is the top priority for IT professionals trying to put actionable controls around …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools