
Network as a Service market to exceed $50bn by 2025
The Network as a Service market is poised to rise from $5 billion in 2018 to over $50 billion by 2025, according to a 2019 Global Market Insights report. Market growth drivers …

What will phishers do once push-based MFA becomes widely used?
As phishing continues to be the number one method for initiating a breach, investing in anti-phishing technologies or training – preferably both – should be a …

Flaw in pre-installed software opens Dell computers to remote hijack
Dell computer owners should update the Dell SupportAssist software as soon as possible to close a high-risk remote code execution vulnerability. What is Dell SupportAssist? …

PSD2 and strong customer authentication: Are all elements equal?
The European Payment Services Directive 2 (PSD2), introduced in January 2018, contains the requirement for additional security features for certain online transactions. These …

Researchers working on tools that aim to eliminate computer bugs
It’s bad enough losing an hour’s work when your computer crashes – but in settings like healthcare and aviation, software glitches can have far more serious consequences. In …

What differentiates the strongest cybersecurity programs from the rest
Financial institutions spend an average of around $2,300 per full-time employee on cybersecurity annually, reveals a survey released by Deloitte and the Financial Services …

Trust is at a tipping point: Consumers will react strongly if they feel their privacy is compromised
There’s a stunning lack of consumer trust in the ability of private and public sector organizations to protect their data, as well as sharply conflicting views between …

Government embracing digital transformation but struggling to implement data security
The push towards digital transformation in the U.S. government is putting sensitive data at risk, according to a Thales research conducted by analyst firm IDC. The 2019 Thales …

Week in review: Docker Hub breach, identifying malware in embedded systems, CCPA implementation
Here’s an overview of some of last week’s most interesting news and articles: Mozilla will block Firefox add-ons that contain obfuscated code Mozilla has announced that, …

New infosec products of the week: May 3, 2019
Trustwave unveils new database security scanning and testing software Trustwave unveiled Trustwave DbProtect, new database security scanning and testing software that helps …

Mozilla will block Firefox add-ons that contain obfuscated code
Mozilla has announced that, starting from June 10, Firefox add-ons containing obfuscated code will no longer be allowed on its Add-ons portal and will be blocked. “We …

Google offers auto-delete option for location, web tracking history
Google has added a control option to users’ accounts that will allow them to instruct the company to auto-delete their location history, browsing and search data once a …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems