Most cybersecurity pros took time off due to mental health issues

Cybersecurity and infosecurity professionals say that work-related stress, fatigue, and burnout are making them less productive, including taking extended sick leave – costing US enterprises almost $626 million in... Read more »

eBook: CISO guide to password security

Password security has seen dramatic shifts driven by the escalation of cyber threats and technological advancements. This eBook covers: Best practices for NIST-compliant password security Key benefits of automating... Read more »

Pure Storage enhances its platform with cyber resiliency services and capabilities

Pure Storage announced three new Storage as-a-Service (STaaS) service-level agreements (SLAs) for the Pure Storage platform – cyber recovery and resilience and site rebalance – further empowering organizations to... Read more »

Clever macOS malware delivery campaign targets cryptocurrency users

Cryptocurrency users are being targeted with legitimate-looking but fake apps that deliver information-stealing malware instead, Recorder Future’s researchers are warning. The threat actor behind this complex scheme is going... Read more »

Quantum Xchange expands Phio TX platform to offer secure site-to-site and remote access VPN

Quantum Xchange launched version 4.0 of its quantum-safe key delivery platform Phio TX, featuring Phio VPN, a Virtual Private Network (VPN) to combine AI-native networking with quantum-safe key management... Read more »

How can SLTTs defend against cyber threats?

Managing cybersecurity for any organization is no easy feat. Improving cybersecurity maturity is often even more difficult, made increasingly challenging by the eye-watering costs of cybersecurity products and solutions.... Read more »

SELKS: Open-source Suricata IDS/IPS, network security monitoring, threat hunting

SELKS is a free, open-source, turnkey solution for Suricata-based network intrusion detection and protection (IDS/IPS), network security monitoring (NSM), and threat hunting. The project is developed and maintained by... Read more »

Cybersecurity jobs available right now: June 19, 2024

Application Penetration Tester ShiftCode Analytics | USA | On-site – View job details As an Application Penetration Tester, you will perform Ethical Application Penetration Testing (EAPT) on web applications... Read more »

Find out which cybersecurity threats organizations fear the most

This article compiles excerpts from various reports, presenting statistics and insights on cybersecurity threats faced by businesses and individuals alike. Cyber insurance isn’t the answer for ransom payments Veeam... Read more »

Rising exploitation in enterprise software: Key trends for CISOs

Action1 researchers found an alarming increase in the total number of vulnerabilities across all enterprise software categories. “With the NVD’s delay in associating Common Vulnerabilities and Exposures (CVE) identifiers... Read more »
Subscribe to our Newsletter