Please turn on your JavaScript for this page to function normally.
users
Underserved populations unaware of cybersecurity risks

Members of underserved populations are less likely to know whether they have even been victimized by a cyber attack, and they have lower awareness of cybersecurity risks. …

road
Week in review: G Suite security enhancements, Microsoft 365 security

Here’s an overview of some of last week’s most interesting news and articles: One hundred percent of endpoint security tools eventually fail Endpoint security tools and agents …

DevSecOps
DevSecOps: Fast development without sacrificing safety

DevOps has been a boon to companies looking to shorten the systems development cycle, pushing software developers and IT operations to work together and help their enterprises …

Android
Google will check apps by new developers more thoroughly

In an attempt to thwart Android developers who are set to distribute malicious apps through Google Play, Google will be taking more time when reviewing apps by developers with …

data
Building a modern data registry: Go beyond data classification

For organizations, understanding what data they store and analyze is gaining increasing urgency due to new privacy regulations, from the Global Data Privacy Regulation (GDPR) …

CyberStrong platform
New infosec products of the week: April 19, 2019

CHAOSSEARCH releases new search and analytics platform for cloud storage CHAOSSEARCH released their search and analytics platform. Using scalable elasticity and disruptive …

stock price
Worldwide IT spending to grow just 1.1% in 2019

Worldwide IT spending is projected to total $3.79 trillion in 2019, an increase of 1.1 percent from 2018, according to the latest forecast by Gartner. “Currency headwinds …

architecture
The biggest hurdles to digital transformation initiatives? Budget and top-down support

More than half of enterprise IT professionals need help from industry partners and prefer agile service providers to implement digital transformation, according to a new study …

Microsoft
Microsoft 365 security: Protecting users from an ever-evolving threat landscape

In this age of frequent security and data breaches, the statement “We take our customers’ privacy and security very seriously” has been heard from breached …

laptop
One hundred percent of endpoint security tools eventually fail

Endpoint security tools and agents fail, reliably and predictably, according to the 2019 Global Endpoint Security Trends Report from Absolute. From there, every additional …

network
The perimeter is vanishing, how will you secure your network?

There’s a new reality to network security, driven by the fact that the perimeter is vanishing. The concept of a network being fully enclosed within a building or virtual …

money
Consumers willing to adopt smart payments but companies need to guarantee security

Smart payments adoption shows substantial growth, but consumers have significant security concerns. TNS’ Consumers Confirm Smart Payments Adoption report evaluates US, UK and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools