Please turn on your JavaScript for this page to function normally.
hand
External attackers can penetrate most local company networks

In 93% of cases, external attackers can breach the organization’s network perimeter and gain access to local network resources, and it takes an average of two days to …

Data
Developments that will define data governance and operational security in 2022

Satori shared its predictions for the near future of cloud-based transformation, detailing three major developments to watch for in the world of data governance and …

DLP
Enterprise data loss prevention market to reach $6.265 billion by 2026

The global enterprise data loss prevention market is projected to grow at a CAGR of 21.03% to reach $6.265 billion by 2026, from $1.647 billion in 2019, according to …

Log4j
4 practical strategies for Log4j discovery

For security teams scrambling to secure their organizations against Log4j exploitation, one of the first and most challenging tasks is understanding where Log4j exists within …

gift
How to avoid “festive fraud” during the holiday season

The year-end holiday season is a time for celebration – a chance to decorate homes, splurge on gifts and gather with family and friends. It’s also a time when the scammers …

IoT
Manufacturers of IoT devices should step up when it comes to security

With significant growth projected in the global IoT market over the next 6 years, the need to subsequently secure devices at the edge from attacks, safe and secure through the …

mobile apps
Web app attacks are skyrocketing, it’s time to protect APIs

Web app attacks against UK businesses have increased by 251% since October 2019, putting both organizations and consumers at risk, an Imperva reserach reveals. In a study of …

5G
Five megatrends for 5G mmWave for 2022 and beyond

It’s been a tumultuous year for 5G as wireless carriers scrambled to deploy their networks at mid-band and increasingly millimeter-wave frequencies, and the trend will …

week in review
Week in review: Log4j new vulnerabilities, Microsoft patch bypass, 2022 e-commerce threat trends

Here’s an overview of some of last week’s most interesting news, articles and interviews: The Log4j saga: New vulnerabilities and attack vectors discovered The …

New infosec products of the week: December 24, 2021

Here’s a look at the most interesting products from the past week, featuring releases from BlackBerry, Box, and Veriff. Veriff’s metaverse identity verification solution …

bot
Bots are stealing Christmas!

Kasada released new data on the latest fraud and malicious automation trends, revealing increased threats during the holidays; rising attacks by bots; and the discovery of a …

ecommerce
The retail sector needs to know when and not if it will be hacked

This year, major chains like Target and Walmart closed on Thanksgiving, which resulted in a 90.4 percent dip in visits to brick-and-mortar stores when compared to 2019. This …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools