Please turn on your JavaScript for this page to function normally.
cloud hand
Independent security audits are essential for cloud service providers. Here’s why

As more companies outsource IT infrastructure to third-party providers and adopt cloud-based collaboration tools, the need for partners that deliver strong protection and …

Enclave
Product showcase: Enclave – using zero trust network access to simplify your networks

A huge number of Internet-accessible systems are protected by the principle of connect, then authenticate. This includes VPNs, web applications, databases, Windows Servers …

Shark
Cybersecurity is getting harder: More threats, more complexity, fewer people

Splunk and Enterprise Strategy Group released a global research report that examines the security issues facing the modern enterprise. More than 1,200 security leaders …

healthcare
Lack of data readiness threatens digital transformation in healthcare

A majority of healthcare leaders have established digital transformation as a top priority spurred by the pandemic, yet they’re facing a chronic, underlying challenge that’s …

Patch Tuesday
Microsoft fixes actively exploited zero-day reported by the NSA (CVE-2022-24521)

On this April 2022 Patch Tuesday, Microsoft has released patches for 128 CVE-numbered vulnerabilities, including one zero-day exploited in the wild (CVE-2022-24521) and …

Ukraine
Sandworm hackers tried (and failed) to disrupt Ukraine’s power grid

The Computer Emergency Response Team of Ukraine (CERT-UA), with the help of ESET and Microsoft security experts, has thwarted a cyber attack by the Sandworm hackers, who tried …

data
Data democratization leaves enterprises at risk

Today’s digital landscape has increased enterprises’ reliance on large datasets and analytics, underscoring the value of data for business. A recent report from NewVantage …

data
Cyber defense: Prioritized by real-world threat data

The impact of a cybersecurity breach can be painful for any enterprise, and devastating for some. Any one of the top five threats we see in today’s environment—malware, …

risk
The benefits of cyber risk quantification in the modern cybersecurity landscape

Kovrr and SANS Institute released their joint survey that reveals enterprise motivation and impact of cyber risk quantification (CRQ) in the modern cybersecurity landscape. …

shield
How to perform cybersecurity market analysis

The European Union Agency for Cybersecurity (ENISA) introduces a framework to perform cybersecurity market analyses and dives into the market of the Internet of Things (IoT) …

XDR
Open XDR: Balancing risk and cybersecurity costs through a unified platform approach

Join security leaders from the University of Denver and EBSCO to learn how Open XDR’s intelligent correlation eliminates alert fatigue and identifies and protects against …

fix
Windows Autopatch: Managed enterprise patching for Windows and Office

While IT administrators are mentally preparing themselves for yet another Patch Tuesday, Microsoft has announced Windows Autopatch: a new service that aims make the second …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools