Please turn on your JavaScript for this page to function normally.
XDR
XDR: Security’s new frontier

As enterprises transform their IT environment and workforce, finding the right security approach is critical for success. Without the proper protective measures in place, …

threat modeling
Threat modeling needs a reset

Organizations need to rethink their approach to threat modeling or risk losing its value as a key defense in their cybersecurity arsenals. The traditional approaches to threat …

compliance
Chief Compliance Officers must embrace new leadership responsibilities

As demands on the compliance function grow more intense, Chief Compliance Officers (CCOs) must proactively embrace new leadership responsibilities for their role and …

cloud
Major threats to cloud infrastructure security include a lack of visibility and inadequate IAM

98% of companies had experienced at least one cloud data breach in the past 18 months compared to 79% last year, according to an IDC survey. Meanwhile, 67% reported three or …

colors
An organization’s security posture will benefit from increased coordination

NAVEX Global released key findings from its survey of IT security professionals in the U.S. and U.K. on the collaboration between the IT and risk management functions. …

smart cybersecurity spending
SMBs willing to spend more money to protect their data

Cybersecurity remains a top priority for SMBs worldwide, as revealed in a survey conducted by Vanson Bourne. The report found that organizations are challenged to find a MSP …

Google Play
New security measures to keep Google Play safe

Google is announcing two new security measures aimed at minimizing the number of malicious / potentially unwanted apps available for download from the Google Play Store: …

Cisco
Cisco security devices targeted with CVE-2020-3580 PoC exploit

Attackers and bug hunters are leveraging an exploit for CVE-2020-3580 to compromise vulnerable security devices running Cisco ASA or FTD software. Active attacks apparently …

tools
Regula: Open source policy engine for IaC security

Fugue announced Regula 1.0, an open source policy engine for infrastructure as code (IaC) security. Available at GitHub, the tool includes support for common IaC tools such as …

fraud detection
How to conquer synthetic identity fraud

“No single organization can stop synthetic identity fraud on its own,” reports The Federal Reserve. “Fraudster tactics continually evolve to stay a step ahead of detection—and …

biohazard
Zero day malware reached an all-time high of 74% in Q1 2021

74% of threats detected in Q1 2021 were zero day malware – or those for which a signature-based antivirus solution did not detect at the time of the malware release – capable …

containers
Unstructured data still overshared inside and outside organizations

The number of overshared files rose 450 percent compared to the same quarter in 2020, highlighting the significant impact of the pandemic and remote work on data security. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools