
Securing vehicles from potential cybersecurity threats
Organizations in the automotive industry are no stranger to demands and mandates regarding car and passenger safety, so addressing the issue of cybersecurity of computerized, …

Cybersecurity only the tip of the iceberg for third-party risk management
Most companies are missing key risks at more than one stage of the vendor risk lifecycle, yet few are expanding their TPRM programs to address these risks, according to …

Most users don’t know the capabilities and risks of QR codes
QR code usage continues to rise in popularity. In fact, 57% of respondents to a new Ivanti study claim to have noticed an increase in the usage of QR codes since mid-March …

Complexity and budgetary constraints complicate cloud security
While spending on cloud services is high, with more than half of respondents having spent more than $10 million and 11% having spent more than $100 million in the last three …

Most enterprise leaders concerned about digital transformation ROI
Digital.ai released a report detailing the findings of a survey of over 600 enterprise IT, security, and business decision makers on the state of digital transformation in …

Facebook Messenger users targeted by a large-scale scam
A large-scale scam campaign targeting Facebook Messenger users all over the world has been detected by Group-IB. Digital Risk Protection (DRP) analysts have found evidence …

Approaching zero trust security strategically
With digital transformation efforts accelerating, the attack surface expanding exponentially and conventional perimeter-based security continuing to fail, there’s never been a …

Product showcase: Accurics
It is no big secret that infrastructure has changed over the last decade. We went from tools such as autossh, to configuration management, and ended up with Infrastructure as …

Consumer data protection is a high priority, but there’s still work to be done
Enterprises see protecting customer personal information as the top reason to encrypt data, and yet report actually encrypting customer data at a far lower rate. This and …

CISO’s guide to automating third-party cyber risk management
With increasing dependence on third parties in today’s interconnected world, vendor security risk assessments are more essential than ever. Failing to do them may result in …

Even though critical, web application security is getting less attention
As organizations shifted focus to support remote work and business continuity amid the challenges of 2020, web application security suffered, according to an Invicti Security …

Employees don’t want to give up work flexibility after the pandemic is over
A research Qualtrics reveals what employees and customers want their experiences to look like in the future of work. Work flexibility The study finds that workforce …
Featured news
Resources
Don't miss
- Roundcube RCE: Dark web activity signals imminent attacks (CVE-2025-49113)
- Balancing cybersecurity and client experience for high-net-worth clients
- CISOs, are you ready for cyber threats in biotech?
- fiddleitm: Open-source mitmproxy add-on identifies malicious web traffic
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?