How do I select a policy automation solution for my business?
Organizations nowadays have to meet a growing number of regulatory, compliance and legal requirements. The more complex an organization is, the more time consuming these …
Why are we still asking KBA questions to authenticate identity?
Do you remember the name of your second-grade teacher? How about your maternal grandfather’s middle name? If you’ve ever forgotten a password, you’ve no doubt experienced the …
How do I select a DRaaS solution for my business?
It has become crucial nowadays, besides having all necessary protections implemented within your system, to also have a disaster recovery plan ready in case an attack occurs. …
Ten CIO agenda predictions that will impact IT pros by 2026
According to an IDC report, through 2026, 65% of CIOs will sustain a cycle of tech-based empowerment, agility, and resilience through collaborative governance, new service …
Mapping ATT&CK techniques to CVEs should make risk assessment easier
Vulnerability reporters should start using MITRE ATT&CK technique references to describe what the attacker is trying to achieve by exploiting a given CVE-numbered …
Advice from a young, female CISO: Key lessons learned
Ellen Benaim, the newest CISO at Copenhagen-based SaaS provider Templafy, started her career at the company in June 2018 as technical support, but from the moment she sat down …
How do I select an SD-WAN solution for my business?
In a time when businesses are becoming hybrid and remote, companies have been turning more and more to the adoption of SD-WAN solutions, particularly paying attention to their …
Is offensive testing the way for enterprises to finally be ahead of adversaries?
The one principle the cyber-security industry is founded on is that defenders are always a step behind the hackers. Solutions are developed (FW, AV and onwards), technologies …
SolarWinds hackers are going after cloud, managed and IT service providers
Nobelium, the advanced, persistent threat (APT) actor behind the 2020 SolarWinds supply chain attack that served as a springboard for breaching a variety of high-level …
Smartphone counterespionage for travelers
If you’re traveling abroad on business, there’s a good chance you’ll need to bring along a smartphone to get around, meet up with associates or learn about the idiosyncrasies …
Secure your databases against opportunistic attackers
If you connect databases / servers to the internet and secure them poorly, you can count on them getting compromised quickly. According to findings by Radoslaw Zdonczyk, …
The importance of crisis management in the age of ransomware
Cybersecurity crises are becoming commonplace. With the massive surge in ransomware attacks in the last few years, businesses can’t afford to ignore the increasing …
Featured news
Resources
Don't miss
- The AI safety conversation is focused on the wrong layer
- Critical NetScaler ADC, Gateway flaw may soon be exploited (CVE-2026-3055)
- GitHub-hosted malware campaign uses split payload to evade detection
- Measuring security performance in real-time, not once a quarter
- Attackers are handing off access in 22 seconds, Mandiant finds