Please turn on your JavaScript for this page to function normally.
question
What do CISOs want from cybersecurity vendors right now?

As COVID-19 spreads across the globe, what challenges are CISOs and other cybersecurity executives dealing with and what things they don’t want to be dealing with at the …

audio
Radio frequency: An invisible espionage threat to enterprises

You can’t see it, but corporate airspaces are under attack via radio frequencies. Foreign governments, competitors and cyber criminals are all conducting radio-based attacks …

bug hunting
Full-time bug hunting: Pros and cons of an emerging career

Being a bug hunter who discloses their discoveries to vendors (as opposed to selling the information to the highest bidder) has been and is an ambition of many ethical …

lock
A client-side perspective on web security

Threats to web security are explained in this first of a three-part article series, and client-side security is shown to address a commonly missed class of cyber attack …

Qualys VMDR
Qualys VMDR: Discover, prioritize, and patch critical vulnerabilities in real time

In this podcast, Prateek Bhajanka, VP of Product Management, Vulnerability Management, Detection and Response at Qualys, discusses how you can significantly accelerate an …

shield
Threat detection and the evolution of AI-powered security solutions

Ashvin Kamaraju is a true industry leader. As CTO and VP of Engineering, he drives the technology strategy for Thales Cloud Protection & Licensing, leading a researchers …

identity
How to balance privacy concerns around facial recognition technology

There has been global uproar regarding facial recognition technology and whether and when it’s ethically sound to use it. Its use without citizens’ consent could have …

Biohazard
Vulnerable VPN appliances at healthcare organizations open doors for ransomware gangs

The increased enterprise VPN use due to the COVID-19 pandemic and the work-from-home (WFH) shift has not gone unnoticed by ransomware gangs, Microsoft warns. “We’re …

face
Identity fraud: Protecting your customers from the new kids in town

It’s one thing to have your credit card stolen, but your identity is a whole other ball game. The worst thing is, it’s a lot more common than you’d think. Identity fraud …

network
Steering your network in the right direction with segmentation

Throughout history, individuals have taken innovations in their prime and tried to mold them into objects they were never designed to be. An example? The first cars were …

remote work
Remote work and web conferencing: Security and privacy considerations

As more and more people remain at home and work from home due to the COVID-19 pandemic, most of them have been forced to use one or many video and audio conferencing …

cybersecurity recruiter
Should you hire a specialized cybersecurity recruiter?

Finding skilled cybersecurity professionals to fill organizations’ increasing needs is becoming more difficult by the day due to the wide (and widening) cybersecurity …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools