Please turn on your JavaScript for this page to function normally.
Emotet
Emotet stages a comeback via Trickbot and spam

Emotet is back – a number of researchers have confirmed. About Emotet Emotet is a modular banking trojan that also functions as a downloader of other trojans and …

tunnel light
Illuminating the path: Compliance as the key to security-by-design

Like taxes or going to the dentist, compliance is one of those topics that people often don’t like to contemplate. There are many reasons for the distaste but this …

fire
Combating cybercrime: Lessons from a CIO and Marine veteran

A colleague asked me recently if I thought the FBI had finally experienced enough of the cyberattacks plaguing the United States and would now more aggressively pursue the …

Mike Hendrickson
The latest trends in online cybersecurity learning and training

In this interview with Help Net Security, Mike Hendrickson, VP of Technology & Developer Solutions at educational technology company Skillsoft, talks about the trends in …

online gaming
76% of gamers were financially affected by a cyberattack, losing $700+ on average

NortonLifeLock published the findings of a global study that sheds light on the cyber risks impacting the gaming community. The survey, conducted by The Harris Poll among more …

fix
What is challenging secure application development?

A Censuswide report reveals the biggest security challenges that application security (AppSec) managers and software developers are facing within their organizations in …

paint
Businesses are forced to adopt new cybersecurity measures

Eighty five percent of US and UK employers were forced to adopt new cybersecurity measures because of the COVID-19 pandemic and the shift to remote working, according to a …

digital transformation
Digital transformation spending to reach $2.8 trillion in 2025

Global spending on the digital transformation (DX) of business practices, products, and organizations is forecast to reach $2.8 trillion in 2025, more than double the amount …

Zoom
Zoom patches vulnerabilities in its range of conferencing apps

Zoom has patched vulnerabilities in its range of local solutions for conferences, negotiations and recordings – Zoom Meeting Connector Controller, Zoom Virtual Room …

see
We need a Cyber Awareness Century

For a generation of people that panic if they leave home without their phone or in the event of a social media outage, we are still very unequipped to handle the internet’s …

zero
Operational technology and zero trust

Zero trust, otherwise known as zero trust architecture (ZTA), is a shift in the way we think about security. Zero trust is the concept of centralizing policy control, limiting …

gears
How do I select a policy automation solution for my business?

Organizations nowadays have to meet a growing number of regulatory, compliance and legal requirements. The more complex an organization is, the more time consuming these …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools