(IN)SECURE Magazine issue 71 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 71 has been released today. It’s a free …
How to build a security tool that sells
In my experience as a CISO in the industry, as well as in my current position as CISO-in-Residence at YL Ventures, an early-stage, cybersecurity-focused venture capital firm, …
Attackers using default credentials to target businesses, Raspberry Pi and Linux top targets
Findings from a Bulletproof report highlight the issue posed by poor security hygiene as automated attacks remain a high security threat to businesses. The research gathered …
How fast can organizations respond to a cybersecurity crisis?
Immersive Labs launched an analysis of human cyber capabilities. The report analyzed cyber knowledge, skills and judgment from over half a million exercises and simulations …
Biden legitimizes cryptocurrency with regulatory exploration
For some time, cryptocurrency was considered a fringe currency – a libertarian means of investing that challenged the traditional framework of brokers, trade desks and …
Take a walk on the client side: The importance of front-end JavaScript security assessments
As e-skimming, Magecart, and other types of front-end attacks grow in frequency and severity, businesses are faced with finding ways to protect the front-end (i.e., client …
Perimeter intrusion detection systems market to reach $5.98 billion by 2026
The global perimeter intrusion detection systems market is expected to witness an incremental growth of $5.98 billion between 2021 and 2026. Technavio expects the growth to …
On-demand webinar: Demystifying zero trust to protect connected assets in OT
Over the past few years, zero trust has become a commonly used phrase for security professionals. While we may understand that a zero-trust framework or architecture should be …
Veeam fixes critical RCEs in backup solution (CVE-2022-26500, CVE-2022-26501)
Veeam Software has patched two critical vulnerabilities (CVE-2022-26500, CVE-2022-26501) affecting its popular Veeam Backup & Replication solution, which could be …
Financially motivated threat actors willing to go after Russian targets
As Ukrainian organizations are getting hit with yet another data-wiping malware, financially motivated threat actors are choosing sides and some of them are expressing their …
Are you willing to take a calculated risk? Quantifying your cyber risk and predicting future threats
We can all agree that cyber attacks are inevitable. The next step for cybersecurity professionals is reaching a consensus on the best way to prepare for unknown threats …
The simple secret to app security? Time
The thing about being a security consultant is that people are always looking to you for the “secret” to building a secure digital anything. And by “secret,” they usually mean …