Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

It only takes five days on average for attackers to exploit a vulnerability, according to a new report. Read more »

Can Security Experts Leverage Generative AI Without Prompt Engineering Skills?

A study at Rensselaer Polytechnic Institute presented at ISC2 Security Congress compared ChatGPT-written training prompted by security experts and prompt engineers. Read more »

What Is Secure Access Service Edge?

There has been plenty of hype around secure access service edge. Some even say it is replacing legacy network and security architectures. Drew Robb, writing for TechRepublic Premium, lays... Read more »

ISC2 Security Congress 2024: The Landscape of Nation-State Cyber Attacks

CISA advisor Nicole Perlroth closed out ISC2 Security Congress’ keynotes with a wake-up call for security teams to watch for nation-state-sponsored attacks. Read more »

Australia’s New Scam Prevention Laws: What You Need to Know

Australia’s Scam Prevention Framework aims to protect consumers by holding tech, banking, and telecom sectors accountable, with fines up to $50 million. Read more »

The 6 Best Antivirus Software Providers for Mac in 2024

Macs may need additional antivirus protection in a business environment or high-risk use case. Bitdefender is the best overall Mac antivirus provider when it comes to protection, usability, and... Read more »

Can You Fax a Check? Yes. Follow These Steps to Do it Safely

Discover how to legally, securely, and quickly fax a check whether you’re using a traditional fax machine or an online faxing service. Read more »

Microsoft: Ransomware Attacks Growing More Dangerous, Complex

Attackers launched 600 million cybercriminal and nation-state threats on Microsoft customers daily, including ransomware attacks, in the last year, according to the tech giant. Read more »

Number of Active Ransomware Groups Highest on Record, Cyberint’s Report Finds

This indicates that the most prominent ransomware groups are succumbing to law enforcement takedowns, according to researchers from Cyberint. Read more »

NIS 2 Compliance Deadline Arrives: What You Need to Know

The NIS 2 compliance deadline is Oct. 17. Discover essential insights on requirements, impacts, and what organisations must do now. Read more »
Subscribe to our Newsletter