
Enterprises increasingly adopting containers, many turning to providers for support
U.S. enterprises increasingly are adopting containers to streamline their applications workflows, with many turning to container services and solutions providers to help them …

400GbE data center switch ports shipments to exceed 10 million this year
Shipments of 400 gigabit Ethernet (GbE) data center switch ports are on track to exceed 10 million this year, more than triple the prior year’s shipments, according to a …

Week in review: Strengthening firmware security, Help Net Security: XDR Report released
Here’s an overview of some of last week’s most interesting news, articles and interviews: Help Net Security: XDR Report has been released The topic of this …

New infosec products of the week: October 15, 2021
Here’s a look at the most interesting product releases from the past week, featuring releases from Aqua Security, AT&T, Datto, Huntress and ReliaQuest. ReliaQuest …

Policy automation to eliminate configuration errors
Far too often, major security breaches can be traced back to a configuration error. Changes and adjustments to network and security configurations are unavoidable; they are a …

Android data sharing remains significant, no opt-out available to users
An in-depth analysis of a range of popular Android mobile phones has revealed significant data collection and sharing, including with third parties, with no opt-out available …

70% of businesses can’t ensure the same level of protection for every endpoint
A Deep Instinct research, which seeks to discover the cybersecurity concerns keeping CISO’s and SecOps professional up at night, found that 86% of UK respondents believe …

Human hacking increased as apps and browsers moved completely to the cloud
Human hacking – phishing attacks across all digital channels – has dramatically increased in 2021. SlashNext released its first report showing a 51% increase in attacks …

Finance data management initiatives constrained by lack of digital skills and maturity
Data management initiatives in the finance sector, such as data collection, integration, and automation, are being constrained by a severe lack of digital skills and maturity. …

Organizations failing to give users the login experience they want
Companies often claim to be customer-centric, or even customer-obsessed, striving to offer technologies that their users demand. However, the findings of a recent global Auth0 …

Whitepaper: What is CCPA and how can it affect your business?
Learn about California’s Consumer Privacy Laws and Regulations (CCPA and CPRA), what is their impact on your security and how to comply with their essential …

Add a new dimension to ransomware defenses
Ransomware is a particularly heartless endeavor. Criminals have targeted schools, vital infrastructure, and even patient records at a psychiatric treatment facility. The US …
Featured news
Resources
Don't miss
- Attackers hit MSP, use its RMM software to deliver ransomware to clients
- Why data provenance must anchor every CISO’s AI governance strategy
- Woodpecker: Open-source red teaming for AI, Kubernetes, APIs
- Hottest cybersecurity open-source tools of the month: May 2025
- Microsoft, Dutch security agencies lift veil on Laundry Bear cyber espionage group