eBook: Cybersecurity career hacks for newcomers

Are you excited to pursue a cybersecurity career but unsure where to begin? Whether you’re a student, an incoming professional, or ready to work in a different field, the... Read more »

Fortinet unveils two high-performance switches to securely connect the modern campus

Fortinet announced two new campus switches, the FortiSwitch 600 and 2000. These switches support the growing connectivity and security needs of the campus with high performance, embedded intelligence, and... Read more »

Flexxon Xsign protects sensitive data reserved only for authorized personnel

Flexxon launched its latest security product, Xsign. Now available globally, the Xsign provides enhanced security through an innovative approach to unlocking sensitive data reserved only for authorized personnel. With... Read more »

Hackuity 2.0 improves how teams identify, prioritise, and remediate vulnerabilities

Hackuity launched a Version 2.0 of its next generation platform, featuring major enhancements to bring further support to organisations in prioritising risks. Hackuity’s intelligent Risk-Based Vulnerability Management combines threat... Read more »

$2.7 billion lost to social media scams since 2021

Scams originating on social media have accounted for $2.7 billion in reported losses since 2021, more than any other contact method, according to the Federal Trade Commission. Social media... Read more »

Microsoft 365 email senders urged to implement SPF, DKIM and DMARC

In the wake of Google’s announcement of new rules for bulk senders, Microsoft is urging Microsoft 365 email senders to implement SPF, DKIM and DMARC email authentication methods. “These... Read more »

Exploit writers invited to probe Chrome’s V8 engine, Google Cloud’s KVM

Google is asking bug hunters and exploit writers to develop 0-day and n-day exploits in Chrome’s V8 JavaScript engine and Google Cloud’s Kernel-based Virtual Machine (KVM). “We want to... Read more »

Selective disclosure in the identity wallet: How users share the data that is really needed

Name, date of birth, address, email address, passwords, tax records, or payroll – all this sensitive user data is stored by companies in huge databases to identify individuals for... Read more »

Automotive cybersecurity: A decade of progress and challenges

As connected cars become a standard feature in the market, the significance of automotive cybersecurity rises, playing an essential role in ensuring the safety of road users. In this... Read more »

Incentivizing secure online behavior across generations

As the landscape of online security continues to evolve, there is a noticeable shift in people’s perceptions of cybersecurity, with an increasing awareness of its vital role in staying... Read more »
Subscribe to our Newsletter