Please turn on your JavaScript for this page to function normally.
market
IT teams forced into compromising security for business continuity during pandemic

IT teams have been forced into compromising security for business continuity at a time of rising threats, a HP report reveals. Making matters worse, their attempts to increase …

Fred Kneip
Third-party cloud providers: Expanding the attack surface

In this interview with Help Net Security, Fred Kneip, CEO at CyberGRX, talks about the lack of visibility into third-party risk, how to address this issue, and what companies …

trend
Network security market growth driven by remote work popularity and security needs

Frost & Sullivan’s recent analysis of the Asia-Pacific (APAC) network security (NWS) market finds that the increasing acceptance of remote work and adoption of …

zero trust
A zero-trust future: Why cybersecurity should be prioritized for the hybrid working world

The pandemic has had a significant impact on the way we work, and one of our recent research studies found that nearly 65% of companies expect some or all their workforce to …

Phone
When a scammer calls: 3 strategies to protect customers from call spoofing

One of the first internet memes was born when The New Yorker published the now iconic cartoon captioned, “On the internet, no one knows you’re a dog.” Today we might update …

Shreekant Thakkar
The role of automation in staying on top of the evolving threat landscape

In this interview with Help Net Security, Dr Shreekant Thakkar, Chief Researcher, Secure Systems Research Centre at TII, talks about the ever evolving threat landscape and how …

David Taylor
Ransomware attacks: The power of adaptation

The pandemic has had a major impact on almost every aspect of our society and left many organizations susceptible to increasingly sophisticated ransomware attacks. In this …

Crypto exchanges and their customers must protect themselves as attacks continue

Within the past several years, cryptocurrency has gone from a niche hobby to a mainstream concern. Cryptocurrencies like Bitcoin, Ethereum, and even Dogecoin have generated …

SIEM
Traditional SIEM platforms no longer meet the needs of security practitioners

Panther Labs released the findings from their report which surveyed over 400 security professionals who actively use a SIEM platform as part of their job, including CISOs, …

Baha Zeidan
Healthcare cybersecurity under attack: How the pandemic affected rural hospitals

Ever since it started, the pandemic has greatly affected the overall threat landscape, with different organizations falling victims to cyberattacks. Understandably, those who …

insider threat
Enterprises are missing the warning signs of insider threats

Organizations struggle to identify the warning signs of insider threats, according to a report by the Ponemon Institute. The report surveyed a global pool of 1,249 IT and IT …

cloud
Enterprising criminals are selling direct access to cloud accounts

Lacework released its cloud threat report, unveiling the new techniques and avenues cybercriminals are infiltrating to profit from businesses. The rapid shift of applications …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools