DDoS attacks becoming larger and more complex, finance most targeted sector
Distributed Denial-of-service (DDoS) attacks decreased slightly in 2021 but are becoming larger and more complex in nature, an analysis from F5 has found. Data showed a 3% …
Deploying pseudonymization techniques to protect health data
A report of the European Union Agency for Cybersecurity (ENISA) explores how pseudonymization techniques can help increase the protection of health data. The healthcare sector …
Why do organizations need to prioritize cyber resiliency?
OpenText announced a report which provides in-depth analysis, market insights, trend data, and predictions for what lies ahead as organizations move toward strengthening their …
BYOD and enterprise mobility market to reach $157.3 billion by 2026
Amid the COVID-19 crisis, the global market for BYOD and enterprise mobility estimated at $84.4 billion in the year 2022, is projected to reach a revised size of $157.3 …
Mars Stealer malware pushed via Google Ads and phishing emails
Cybercriminals trying to foist the Mars Stealer malware onto users seemingly have a penchant for one particulat tactic: disguising it as legitimate, benign software to trick …
Web3 and the future of data portability: Rethinking user experiences and incentives on the internet
Tech conversations are now peppered with a new, contentious buzzword: Web3, and we’re all likely to hear a lot more of it in the coming years. It’s an umbrella term for …
How to recruit cybersecurity talent from atypical backgrounds
In this interview with Help Net Security, Max Shuftan, Director of Mission Programs & Partnerships at SANS Institute, talks about how companies and the cybersecurity …
Product showcase: Secure online authentication “Made in Germany” by Swissbit
New iShield FIDO2 USB-A / NFC security key protects access to applications and online services. Today it is more critical than ever before for businesses to equip themselves …
Posts on name-and-shame dark web leak sites climbed 85% in 2021
Ransomware payments hit new records in 2021 as cybercriminals increasingly turned to dark web leak sites where they pressured victims to pay up by threatening to release …
The benefits of implementing continuous security in the development lifecycle
Wabbi published new research with IDG that finds companies utilizing continuous security have decreased vulnerabilities by 50%. The study focused on the integration of …
How hard is it to address Apple’s in-app deletion requirements and implement privacy compliance?
Transcend released the results of its latest survey of technology decision makers, which assessed their readiness for Apple’s in-app deletion requirements for iOS apps that …
DevOps market to exceed $30 billion by 2028
The DevOps market is expected to surpass $30 billion by 2028, as reported in a research study by Global Market Insights. The growing demand to minimize system development …
Featured news
Resources
Don't miss
- Security at AI speed: The new CISO reality
- Apple privacy labels often don’t match what Chinese smart home apps do
- In GitHub’s advisory pipeline, some advisories move faster than others
- Don’t panic over CISA’s KEV list, use it smarter
- Hackers probe, exploit newly patched BeyondTrust RCE flaw (CVE-2026-1731)