
Gamification can redefine the cybersecurity demo experience
Lead generation is the easy part of the sales cycle. Marketing activities, sales enablement tools, events, and so on should create the perfect environment that allows sales …

A digital shift requires a new approach to asset management: How to reduce security risks
The global pandemic forced organizations to rapidly accelerate their digital transformation. As a result, nearly overnight, companies spanning all sizes and sectors deployed …

A look at the 2021 CWE Top 25 most dangerous software weaknesses
The 2021 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses is a demonstrative list of the most common issues experienced over the previous two …

Navigating the 2021 threat landscape: Security operations, cybersecurity maturity
Ransomware attacks have been increasingly in the headlines, and reaching historic levels of impact. Findings from a new report from ISACA in partnership with HCL Technologies …

Organizations still rely on weak security for remote workers
A new survey of enterprise IT security leaders showed almost 80 percent believe remote workers are at more risk for phishing attacks now because they’re isolated from …

Retailers turn to zero trust to keep consumers and employees secure
Retailers have not only had to contend with the business disruption resulting from the COVID-19 pandemic, but they have also experienced increased security risks in the …

NetOps has become fundamental to network management, yet training efforts are lacking
Nearly two-thirds (64%) of network managers, network architects, and network engineers said their organizations have hired dedicated network automation engineers to transition …

Confidence that quantum computers will solve major problems has soared
Confidence that quantum computers will solve major problems that are beyond the reach of traditional computers—a milestone known as quantum advantage—has grown fast in the …

Week in review: Verifiable credentials, API security, how to develop a skilled cybersecurity team
Here’s an overview of some of last week’s most interesting news, interviews and articles: Ransomware can penetrate quickly, significantly damaging an organization …

New infosec products of the week: July 30, 2021
Here’s a look at the most interesting product releases from the past week, featuring releases from Ivanti, Stellar Cyber, SpecterOps, Aqua Security, Infinipoint, …

Why isn’t cloud backup part of common security practices?
The threat of ransomware is omnipresent, and the tactics deployed by cybercriminals are constantly evolving to wreak as much havoc as possible. Recent attacks like the one on …

Engaging with governments is a data security priority
Global tax systems are responsible for handling and storing vast amounts of data. Whether it’s details of a supplier’s transactions with its customers, or personal financial …
Featured news
Resources
Don't miss
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info