
Organizations must rethink traditional IT strategy to succeed in the new normal
64% of IT pros are instilled with a new sense of confidence, despite contending with challenges such as reduced budgets, greater decision-making responsibilities, and longer …

What happens to funds once they have been stolen in a cyberattack?
SWIFT and BAE Systems published a report that describes the complex web of money mules, front companies and cryptocurrencies that criminals use to siphon funds from the …

Intelligent processes and tech increase enterprises’ competitiveness
Enterprises of the future will be built on a foundation of artificial intelligence (AI), analytics, machine learning, deep learning and automation, that are central to solving …

(ISC)² Exam Action Plan: Get your certification goals on track for success
Even the best-laid plans can go astray, that’s why we stand ready as ever to help you get your certification goals back on track for success. Every (ISC)² member started out …

September 2020 Patch Tuesday: Microsoft fixes over 110 CVEs again
On this September 2020 Patch Tuesday: Microsoft has plugged 129 security holes, including a critical RCE flaw that could be triggered by sending a specially crafted email to …

Popular Android apps are rife with cryptographic vulnerabilities
Columbia University researchers have released Crylogger, an open source dynamic analysis tool that shows which Android apps feature cryptographic vulnerabilities. They also …

Securing Active Directory accounts against password-based attacks
Traditional password-based security might be headed for extinction, but that moment is still far off. In the meantime, most of us need something to prevent our worst instincts …

Mapping the motives of insider threats
Insider threats can take many forms, from the absent-minded employee failing to follow basic security protocols, to the malicious insider, intentionally seeking to harm your …

Cybersecurity after COVID-19: Securing orgs against the new threat landscape
Picture this: An email comes through, offering new COVID-19 workplace safety protocols, and an employee, worn down by the events of the day or feeling anxious about their …

Global security appliance market revenue grew to $4.2B in Q2 2020
The total security appliance market delivered solid unit shipment and revenue growth in the second quarter of 2020 (2Q20), according to IDC. Worldwide revenue increased 7.5% …

Are today’s organizations ready for the data age?
67% of business and IT managers expect the sheer quantity of data to grow nearly five times by 2025, a Splunk survey reveals. The research shows that leaders see the …

Researchers develop secure multi-user quantum communication network
The world is one step closer to having a totally secure internet and an answer to the growing threat of cyber-attacks, thanks to a team of international scientists who have …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground