
Why you need to make Microsoft 365 a 24/7 security priority
It’s easy to take advantage of the Microsoft 365 service, but are you taking the steps to properly secure all the data your company is storing inside of it? For security …

How the pandemic delivered the future of corporate cybersecurity faster
William Gibson once wrote, “The future is already here – it’s just not very evenly distributed.” The rise of “distributed work”—people working from everywhere, at all …

Coinminers, web shells and ransomware made up 56% of malware targeting Linux systems in H1 2021
Trend Micro released a research on the state of Linux security in the first half of 2021. The report gives valuable insight into how Linux operating systems are being targeted …

40% of SaaS assets are unmanaged, putting companies at risk for data leaks
DoControl announced a report which provides data-driven insights into the growing number of external and insider threats due to vast amounts of unmanageable data in today’s …

22% of cybersecurity incidents in H1 2021 were ransomware attacks
Ransomware attacks made up 22% of all reported cybersecurity incidents in the first half of 2021, according to recent analysis by CybSafe. CybSafe analysed data from the …

Advanced persistent threat protection market to grow steadily by 2026
Amid the COVID-19 crisis, the global market for advanced persistent threat protection estimated at $8 billion in the year 2020, is projected to reach a revised size of $20.3 …

Realtek SDK vulnerability exploitation attempts detected (CVE-2021-35395)
Threat actors are attempting to exploit CVE-2021-35395, a group of vulnerabilities in the web interface of the Realtek SDK, to spread Mirai malware to vulnerable IoT devices. …

Three reasons why ransomware recovery requires packet data
Data from SonicWall’s 2021 Cyber Threat Report showed more ransomware attacks in the first half of 2021 than in all of 2020. Much of the recent conversation around ransomware …

What is the HIPAA Security Rule? Three safeguards to have in place
The past year has catalyzed a new era of healthcare, one where telehealth visits increased as we relied on online communication to keep ourselves informed and healthy. With …

Kubescape helps admins manage Kubernetes securely
Kubescape is an open-source tool for testing if Kubernetes is deployed securely, as defined in the recently released Kubernetes Hardening Guidance by NSA and CISA. About …

How do I select an automated red teaming solution for my business?
Red teaming is an essential part of an organization’s security assessment process. It is generally done manually to uncover possibile vulnerabilities and security gaps, …

Security and compliance still a challenge for container architectures
While adoption of container architectures and microservices continues at an impressive pace, maintaining automated and proactive security and compliance is a particularly …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC