Please turn on your JavaScript for this page to function normally.
zero
Network and IoT security in a zero trust security model

You can never be too careful when it comes to network and IoT security. With a rapidly growing number of disparate devices being connected to corporate and industrial …

shield
CDR: The secret cybersecurity ingredient used by defense and intelligence agencies

It’s very rare that the defense and intelligence community is vulnerable to file-based attacks. After all, for these organizations security is not a business case, it’s a case …

mobile work
Embracing secure hybrid work with four foundational IT controls

Hybrid work has become the norm for many businesses. In fact, a 2021 survey conducted by HR consulting firm Mercer found that out of a group of 510 employers with flexible …

biometrics
Fraud never sleeps: Why biometrics is essential for effective fraud prevention

When the pandemic forced organizations to send customer service agents to work from home, fraudsters quickly seized the new opportunity presented by isolated employees. Social …

airport security
Smartphone counterespionage for travelers

If you’re traveling abroad on business, there’s a good chance you’ll need to bring along a smartphone to get around, meet up with associates or learn about the idiosyncrasies …

risk
What are the post-pandemic security concerns for IT pros?

COVID-19 has had a huge impact on businesses across every industry, and while the urgent need to adapt in early 2020 may have been replaced with greater stability, residual …

ransomware
Five game-changing factors for companies dealing with ransomware attacks

Continual innovation and growing sophistication of cloud services is giving organizations clear and practical routes to deal with ransomware attacks. The latest cloud-based …

virtual reality
Why virtual desktops make sense for a virtual workforce

Across the country businesses and public agencies alike are holding virtual job fairs and summits and talking about the effects of the virtual workforce. Faced with skilled …

road sign
Compliance does not equal security

Buy these widgets. Write these policies. Be compliant. Be secure. While certain industry bodies set specific cybersecurity standards and requirements, following them is not …

SASE
SASE emerges as the edge becomes an enterprise focal point

Network attacks continue to proliferate, especially sophisticated probing of user domain registries, ransomware attacks, and malware injections via trojans. To further …

work from home
WFH is here to stay: Five tactics to improve security for remote teams

When the pandemic took hold, most companies were forced to turn their employees into a fully operational remote workforce within the span of one week. And while some …

zero trust
Analyzing and implementing a national zero trust architecture

This October, we once again find ourselves observing National Cybersecurity Awareness Month. While this effort traditionally targets consumers and businesses, the U.S. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools