CYBERSECURITY INDUSTRY NEWS AND FEATURES

Cox Media Group Validates Ransomware Attack that Pulled Down its Broadcasts

On June 3, 2021, American media company Cox Media Group (CMG) experienced a cyberattack in which the malicious threat actor encrypted the network servers...

INTERVIEWS

WHITEPAPER

Cyber Risk Management

Cyber Risk Management: Does cyber risk get enough boardroom airtime?

Cybercrime is not a burgeoning criminal industry; it is an established threat with severe consequences that cannot be ignored by businesses – and it...
cyberthreats in health care

Cyberthreats: The Stealthily Spreading Cancer in the Health Care Sector

Download the Whitepaper Now! Public health plays a major role in determining the quality of life. As seen during the pandemic, public health and the...
why security programs fail

Here’s Why Security Programs Often Fail

Helen Keller, a famous American author once said, “Security is a superstition. It does not exist in nature.” This quote references the security of...

PODCASTS

MARKET TRENDS REPORT

Cloud computing is transforming digital and IT infrastructure at an astounding pace. The pandemic and changing business models have prompted many businesses to migrate their digital operations and storage to the cloud. Today, it is common practice for an...
Computer Forensics is now known as Digital Forensics and the task of uncovering digital evidence is more challenging than ever. It now involves governments and multiple jurisdictions. Today, forensic experts would need to travel to different countries to find...
The concept of cybersecurity is about solving problems. These can be problems related to sensitive data, financial data, seamless workflow, functions, or simply network-related security issues. However, there is one problem that has been dwarfing the growth of cybersecurity...
With organizations going remote in the year 2020 thousands of desktops, workstations, laptops, mobile phones, tablets, access points, printers, IP-cams, USB devices, cloud VMs, and virtual desktops, which previously acted as personal devices and machines, suddenly became Endpoints of...

HOTSPOTS

Sertainty self protecting data platform

Defend Your Data with a Sense of Sertainty

Sertainty Self-Protecting-Data is an advanced technology that provides data the awareness to act and react, enabling security directly at the data layer. Have a look...

CYBERSECURITY STARTUPS

Penetration Testing, continuous testing, security testing

How FireCompass is Shaping the Future of Security Testing

With the volume of attacks on enterprises increasing by the day, it is no longer sufficient to do occasional or manual penetration testing. Organizations...
ByteChek

In ByteChek, Companies Can Find the “X” Factor for Cybersecurity Compliance

In today's hyper-connected world, cyberthreats are continuously evolving. This is why establishing a risk-based control to protect the integrity, confidentiality, and accessibility of business...

INFOGRAPHICS

GOVERNANCE

PRIVACY

Colorado Inches Closer to Becoming the Third State with a Comprehensive...

The Colorado State Senate approved the "Colorado Privacy Act" on June 8, becoming only the third state after California and Virginia to have a...

STARTUPS

NCSC for Startups Initiative will Address U.K.’s Cybersecurity Challenges

Bringing the technical expertise of both public and private organizations will help mitigate security gaps and boost the overall cybersecurity posture in the country....

THREATS

Listen to Our Latest Podcast

Latest Issue is Out

Upcoming Webinar

Upcoming Webinar

FOLLOW US FOR MORE UPDATES












WORKFORCE