Real-world examples of quantum-based attacks

Quantum computing is poised to revolutionize the way we secure and privatize data. It can potentially disrupt our existing encryption methods, endangering sensitive data from various sources in ways... Read more »

Building resilience through DevSecOps

DevSecOps, short for Development, Security, and Operations, is an approach that emphasizes the integration of security practices and principles into every stage of the software development lifecycle. It aims... Read more »

Growing scam activity linked to social media and automation

The average number of scam resources created per brand across all regions and industries more than doubled year-on-year in 2022, up 162%, according to Group-IB. Additionally, the total number... Read more »

Week in review: Malware delivery via Microsoft Teams, law firms under cyberattack, CVSS 4.0 is out

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: CISO perspective on why boards don’t fully grasp cyber attack risks In this Help... Read more »

BlueVoyant MXDR for Splunk empowers users to identify security threats

BlueVoyant announced MXDR for Splunk, enabling clients to maximize their security investment, expedite implementation, and streamline threat detection. The new service integrates Splunk SIEM (Security Information and Event Management)... Read more »

Teleskope launches AI-based data protection platform

Teleskope has launched a data protection platform that automates data security, privacy, and compliance at scale, helping organizations comply with regulations like GDPR and CCPA, and reduce the manual... Read more »

Cribl scales observability across large enterprises with new product features

As enterprise data grows at a 28% compound annual growth rate, businesses continue to face a myriad of challenges to manage their data and secure their organizations. Most enterprises... Read more »

Meta’s Threads app used as a lure

It was to be expected: As the buzz around Meta’s new microblogging platform Threads gained momentum, some individuals have stepped in to take advantage of the fact that the... Read more »

Generative AI outperforms hackers but not their creativity

72% of hackers are confident that AI cannot replace human creativity in security research and vulnerability management, according to Bugcrowd. Generative AI hacking Generative AI was a major theme... Read more »

Satellites lack standard security mechanisms found in mobile phones and laptops

Researchers from Ruhr University Bochum and the CISPA Helmholtz Center for Information Security in Saarbrücken have assessed the security mechanisms of satellites currently orbiting the Earth from an IT... Read more »
Subscribe to our Newsletter