Please turn on your JavaScript for this page to function normally.
fire
Organizations lack basic cybersecurity practices to combat the growing tide of ransomware

Organizations are not equipped to defend against ransomware due to deficiencies in implementing and sustaining basic cybersecurity practices, including managing privileged …

analyst
Three key areas CIOs should focus on to generate value

To accelerate value creation, CIOs and IT executives should focus on three key areas – leading from anywhere, nurturing connections and reaching beyond, according to Gartner. …

attacks
Attack surface larger than ever as organizations shift to remote and hybrid work

“It was like changing an engine on a plane while it was in flight.” That’s how one security decision maker described the shift to remote work the pandemic forced last year. …

lock
Mobile application security guide, from development to operations

Mobile application security is about delivering leakage-free, vulnerability-free, tamper-proof and self-protecting mobile apps. Applications are the cornerstone of our …

stop
Secure your databases against opportunistic attackers

If you connect databases / servers to the internet and secure them poorly, you can count on them getting compromised quickly. According to findings by Radoslaw Zdonczyk, …

The CISO’s guide to evaluating third-party security platforms

A comprehensive third-party security program can align your vendor’s security with your internal security controls and risk appetite. Such a program can also help you …

road sign
Compliance does not equal security

Buy these widgets. Write these policies. Be compliant. Be secure. While certain industry bodies set specific cybersecurity standards and requirements, following them is not …

SASE
SASE emerges as the edge becomes an enterprise focal point

Network attacks continue to proliferate, especially sophisticated probing of user domain registries, ransomware attacks, and malware injections via trojans. To further …

work from home
WFH is here to stay: Five tactics to improve security for remote teams

When the pandemic took hold, most companies were forced to turn their employees into a fully operational remote workforce within the span of one week. And while some …

collaboration
Recommendations for improving DEI in cybersecurity teams

(ISC)² published a research study that highlights the unique challenges diverse cybersecurity professionals around the world face and provides recommendations to create …

bot
Bots to become the future of work and provide ROI to organizations using them

The prolonged pandemic has already brought many changes to the workplace, and according to a TELUS International survey, 90% of U.S. employees believe bots will play a key …

biometrics
Multi-factor authentications soar as enterprises move away from passwords to secure hybrid workers

Enterprises are taking steps to move away from passwords and adopting low-friction authentication methods to protect the hybrid workforce, a Cisco’s Duo Security report …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools