
Malware Is Making Its Mark on the Darknet
Identity exposure research shows the latest cybercrime trends and tactics used my malicious actors, and shows the evolution of infostealers. | SPYCLOUD...

Building organizational readiness for post-quantum cryptography
Quantum computers capable of breaking current cryptography could emerge in just a few years, and the window to migrate to post-quantum cryptography is closing fast. | PALO ALTO NETWORKS/CIO DIVE...

Why securing GenAI use starts in the browser
As enterprises adopt GenAI, the perimeter is moving to the browser, requiring a new approach to security. | PALO ALTO NETWORKS/CIO DIVE...

How to Navigate the Virtual CISO (vCISO) Market Strategically
Explore the vCISO market to tackle cybersecurity challenges strategically. Choose providers that fit your needs, enhance risk management, and boost resilience without a full-time CISO commitment. | DIGITAL HANDS...

BEC attacks: A business risk your insurance company is unlikely to cover
Business email compromise attacks can cost organizations millions as more work moves online. While many BEC crimes are preventable, companies still fall victim to sophisticated social engineering tactics used by cybercriminals. | INFOSEC...

Japan’s IoT scanning project looks for vulnerable IoT devices
Japan saw national security risks in IoT devices. Ahead of the Summer Olympics, the government launched a project to scan citizens’ connected toasters, light bulbs, and other devices for vulnerabilities. | INFOSEC...

Quantum cyberattacks: Preparing your organization for the unknown
Quantum computing is emerging, and companies are preparing for quantum cyberattacks. Nation-states are investing in quantum research and development, and experts warn encrypted systems will eventually be targeted. | INFOSEC...

CISOs Gain False Confidence in the Calm After the Storm of the Pandemic
CISOs are feeling more confident about their security posture post-pandemic, but organizations are still not fully prepared for the new challenges. | PROOFPOINT...

Immersive Experiences Usher in the Future of Medical Training and Education
Immersive technologies like AR and VR are transforming medical education, enabling interactive, cost-effective training that enhances learning and improves patient care. | LENOVO...

Cultivating Buy-in to Modernize OT Cybersecurity
Church & Dwight partnered with Rockwell Automation to enhance OT cybersecurity, aligning manufacturing, IT, and leadership teams. Their collaborative approach boosted security without disrupting production processes. | ROCKWELL AUTOMATION...

Roses Are Red(Line): Why Credential-Stealing Malware is Giving SOC Teams the Blues
Credential-stealing malware is a growing threat, bypassing security tools to steal credentials and session cookies. Learn how SOC teams can enhance visibility and implement strategies to stop attackers in their tracks. | SPYCLOUD...

What the Growing Need for Cybersecurity Awareness Means for Your Career
Rising cyberattacks emphasize the need for cybersecurity awareness. Organizations are investing in training to build security cultures, creating new career opportunities. | THE H LAYER...

How Hospitals of the Future Can Deliver More Convenient and Connected Patient Experiences
Hospitals can improve patient experiences if they embrace technology for more connected and comfortable experience. Think easy check-in, virtual consultations and more. | LENOVO...

Guide to Critical Infrastructure Cybersecurity
As critical infrastructure organizations undergo digital transformation to improve efficiency and reliability, they must also be aware of new vulnerabilities and cyber security threats. | ROCKWELL AUTOMATION...

How Passwordless Authentication Could Impact Your Day-to-Day Life
Passwordless authentication is gaining popularity because it offers higher security and a more seamless user experience. How could this impact your day-to-day life? | DASHLANE...

Security in Cloud Applications
The last few years have seen a massive shift in cloud security challenges, requiring organizations to implement new strategies to secure cloud applications. | SOFTWARE SECURE...

The Hidden Costs of Ransomware Attacks
Ransomware attacks have far-reaching implications beyond financial costs, including brand reputation, personnel, and SOC personnel, and should be addressed with better visibility and automation. | SPYCLOUD...

How to Reduce Churn and Cut Costs with a Cloud-Based Platform
Customer churn is a growing and expensive problem for communications service providers (CSPs). To win in today’s hyper-competitive industry, CSPs need to rethink their customer experience. | PLUME...

Stolen Passwords and Ransomware Attacks: What Businesses Can Do Right Now
The prevalence of ransomware attacks in the news would compel any business leader or IT admin to ask: Could we be next? You can do one big thing to make it harder for ransomware attackers: Lock down your credentials. | DASHLANE...

Ransomware Attacks on French Hospitals Shows Unrelenting Threat to Healthcare Sector
Ransomware attacks pummeled the healthcare industry in 2020, and the trend continues in 2021 with a rash of attacks. French hospitals are the latest example.| DASHLANE...

How the Hack at a Florida Water Treatment Plant Affects All Organizations in the Public Sector
A hack at the water treatment plant in Florida is an opportunity for critical infrastructure agencies to reevaluate their approach to organizational security. | DASHLANE...

Security Reimagined — Solving an Old Problem with a New Approach
Security pros need to challenge conventional wisdom — that every new threat vector requires adding new tools and methodologies (and consequently, more people) to protect across users, devices, apps, and networks. | CISCO SECURITY...

Are You Going About the Talent Shortage Wrong? It’s Time to Stop MacGyvering
As MacGyver used to say, "There always seems to be a way to fix things.” But are organizations trying to fix the wrong things in security? | CISCO SECURE...

Artificial intelligence and machine learning trends
From protecting endpoints to detecting online fraud, the cybersecurity sector finds wide uses for artificial intelligence and machine learning. | INFOSEC...