
From science to business: High-end quantum computer market will almost double by 2025
Quantum computers are able to reduce computing processes, from years to hours or minutes, and solve problems where even the most advanced conventional computers reach their …

What security and privacy enhancements has iOS 13 brought?
With the release of iPhone 11 and its two Pro variants, Apple has released iOS 13, a substantial functional update of its popular mobile operating system. But while many users …

IT vs OT: Challenges and opportunities – podcast
The Industrial Security Podcast featuring Andrew Ginter: The differences between IT and OT teams and approaches both make life difficult and represent opportunities to improve …

How data breaches forced Amazon to update S3 bucket security
Amazon launched its Simple Storage Service (better known as S3) back in 2006 as a platform for storing just about any type of data under the sun. Since then, S3 buckets have …

Disclosing vulnerabilities to improve software security is good for everyone
Today, software companies and security researchers are near universal in their belief that disclosing vulnerabilities to improve software security is good for everyone, …

How SMBs can bring their security testing on par with larger enterprises
What are the challenges of securing small and medium-sized enterprises vs. larger ones? And how can automated, continuous security testing help shrink the gap? When studying …

How important is packet capture for cyber defense?
Organizations using full packet capture are better prepared to battle cyber threats, according to an Enterprise Management Associates (EMA) report. Visibility and accuracy of …

Product showcase: NetLib Security Encryptionizer
NetLib Security has spent the past 20+ years developing a powerful, patented solution that starts by setting up a defense for any organization wherever your data resides: …

Top challenges for CIOs in a multi-cloud world
Lost revenue (49%) and reputational damage (52%) are among the biggest concerns as businesses transform into software businesses and move to the cloud, according to Dynatrace. …

Week in review: CISO do’s and don’ts, Windows Defender scan fail, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news, articles and podcasts: CISO do’s and don’ts: Lessons learned Keeping a business safe from cyber …

Should you trust your smart TV or streaming device?
“Smart” devices might be handy and offer higher quality services, but users should be aware that everything comes with a price. And we’re not talking here …

Organizations continue to struggle with privacy regulations
Many organizations’ privacy statements fail to meet common privacy principles outlined in GDPR, CCPA, PIPEDA, including the user’s right to request information, to …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted