Please turn on your JavaScript for this page to function normally.
user
How facial recognition solutions can safeguard the hybrid workplace

The number of US adults teleworking due to the pandemic fell by 30% between January and May 2021 (from 23% to 16%), with the biggest drop in May. As more employees return to …

5G
How mobile operators view security in the 5G era

There’s a major gap in security capability among mobile operators, which in many cases is not yet being filled by industry partnerships, Trend Micro reveals. In the 5G …

Business ideas
Most enterprises started a modernization program due to the pandemic

Advanced released a report which examines the current mainframe market, the associated challenges facing large enterprises worldwide, and the impact COVID-19 has and will …

Decision makers divided about cloud technology adoption

As businesses seek technology solutions that help us prepare for a new post-pandemic normal, cloud adoption rates continue to rise. In fact, according to research, 67% of all …

idea
Resilience by design: What security pros need to know about microlearning

It’s no secret that security training is failing us. Research has revealed that more 90% of people struggle to identify a phishing email — arguably one of the most basic …

email
Protecting your organizations against BEC and other email attacks

No matter who you talk to or work with, they probably use email as a primary means of communication. Most of us spend about 5 hours a day checking email, sometimes refreshing …

industrial
Industrial facilities progressively at risk of data theft and ransomware attacks

Trend Micro released a new report highlighting the growing risk of downtime and sensitive data theft from ransomware attacks aimed at industrial facilities. “Industrial …

encryption
Enhancing cloud security with a two-step cryptography technique

The central goal of cloud computing is to provide fast, easy-to-use computing and data storage services at a low cost. However, the cloud environment comes with data …

brain
Secure AI is the foundation of trustworthy AI

AI-based recommendation systems are used in many online services we enjoy today, including search engines, online shopping sites, streaming services, and social media. …

Work
Employers permanently moving to a more flexible work model

Research conducted by Owl Labs, which polled 2000 business leaders based in the UK, Germany, France, and the Nordics shows that just 11% of business leaders expect their …

printer
PoC for critical Windows Print Spooler flaw leaked (CVE-2021-1675)

CVE-2021-1675, a Windows Print Spooler vulnerability that Microsoft patched in June 2021, presents a much greater danger than initially thought: researchers have proved that …

The CISO's Guide to Third-Party Security Management
Download: The CISO’s Guide to Third-Party Security Management

Managing the security of your third parties is crucial, but security assessments are riddled with problems, including a lack of context, scalability and relevance. How can you …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools