
Do your infosec habits make you vulnerable to fraud?
A third of Americans have been a victim of information fraud or identity theft. Despite notable data breaches in 2019, when asked if they update or change passwords/PINs after …

Week in review: How to avoid lateral phishing, what’s the right time to red team?
Here’s an overview of some of last week’s most interesting news and articles: Your supplier’s BEC problem is your BEC problem BEC scammers don’t care what business …

GitHub Security Lab aims to make open source software more secure
GitHub, the world’s largest open source code repository and leading software development platform, has launched GitHub Security Lab. “Our team will lead by …

Attack tools and techniques used by major ransomware families
Ransomware tries to slip unnoticed past security controls by abusing trusted and legitimate processes, and then harnesses internal systems to encrypt the maximum number of …

New infosec products of the week: November 15, 2019
Sysdig Secure 3.0 provides enterprises with threat prevention at runtime Sysdig Secure 3.0 includes an incident response and audit tool for Kubernetes, giving enterprises the …

To improve incident response, you need to consider 3rd party solutions
Organizations reported an average 32% reduction in threat responder workload when they deployed a managed SIEM solution, according to CenturyLink and IDG. Improve incident …

IT professionals deem hybrid cloud as most secure
Enterprises plan to aggressively shift investment to hybrid cloud architectures, with respondents reporting steady and substantial hybrid deployment plans over the next five …

Evaluating cyber risk during the holiday season
Fears of data loss, identity theft and fraud are leaving American consumers on edge this holiday season, and they’re prepared to hold their financial institution responsible …

Disruptive technology predictions: 2020 will see the creation of completely connected environments
Mainstream adoption of disruptive technologies in 2020 will finally see data, automation and IoT technologies come together to create connected cities and societies, NTT …

Automated systems: Flag smarter, not everything
Imagine dealing with 1,000s of security alerts a day, whilst simultaneously juggling the tasks that are part of your day-to-day job. Challenging right? This is the current …

5,183 breaches from the first nine months of 2019 exposed 7.9 billion records
According to Risk Based Security’s Q3 2019 Data Breach QuickView Report, the total number of breaches was up 33.3% compared to Q3 2018, with 5,183 breaches reported in …

Network complexity and lack of visibility contribute to misconfigurations and increased risk
Enterprises are slow to abandon manual processes, despite being short staffed, as the lack of automation, coupled with increasing network complexity risk and lack of …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations