Threats

Stay informed on the latest cybersecurity threats and news to better protect your data, networks, applications, and devices. Our coverage includes emerging vulnerabilities, evolving attack techniques, and the latest security breaches to help you understand and mitigate risks.

  • Tokenization vs. Encryption: Pros and Cons

    Two of the most popular methods for protecting business data are tokenization and encryption. However, choosing the one that is the best for your company requires you to consider factors like company size, security goals, cost, and your comfort level with each choice. Whichever you choose, your ultimate goal should be finding the best option…


  • XDR Emerges as a Key Next-Generation Security Tool

    Corporate networks are complex, and so is the myriad of cybersecurity solutions that protect them. Trying to manage all the security tools in a comprehensive way can leave security teams overwhelmed. Extended detection and response (XDR) solutions are a new attempt to unify all those security tools. They’re designed to consolidate multiple products into a…


  • Disk vs File Encryption: Which Is Best for You?

    Full disk encryption is the most commonly used encryption strategy in practice today for data at rest, but does that mean it’s sufficient to prevent unauthorized access to your data? The short answer: No. File-based encryption is another form of transparent encryption that fills in the gaps where full disk encryption falls short. Fortunately, some…


  • Microsegmentation: The Next Evolution in Cybersecurity

    The explosion in remote work that followed the COVID-19 pandemic has shifted corporate models from a main-branch focus to distributed corporate networks and vastly spread out remote employees. That in turn has shifted focus away from distributed networks and technologies like SD-WAN to the edge of the network – and to technologies like zero trust…


  • Apple White Hat Hack Shows Value of Pen Testers

        The best Cybersecurity Awareness Month lesson may have come from Apple, which could ultimately pay bug bounties of around $500,000 to a group of white hat hackers who found 55 vulnerabilities on Apple’s own networks, including 11 critical vulnerabilities. The main lesson is pretty simple: No one is safe, and the need for…


  • Employees and Data Backup Top Cybersecurity Awareness Month Concerns

        October is National Cybersecurity Awareness Month, and as people are the weakest link in the cybersecurity chain, it’s only fitting that this year’s theme is “Do your part: Be CyberSmart.” Whether it’s unintentionally clicking on a malicious link in an email, poor password hygiene, a misconfiguration or a missed patch, human error is…


  • Email Still a Major Attack Vector: Security Research

    While modern cyber threats can take different forms and delivery methods, email continues to be one of the primary approaches cyber attackers are using to exploit organizations, according to multiple research reports released in May 2019. In this monthly roundup, eSecurity Planet summarizes findings from seven different research reports — and the key lessons that…


  • How Military Tactics Apply to Cybersecurity

    The modern cybersecurity landscape has often been compared to a battlefield, with adversaries and defenders alike using military-style strategy and tactics. With nation-states increasingly engaged in cyber attacks, the military analogy isn’t just a metaphor, it’s becoming a reality for how cybersecurity actually works. Among the most well known institutions in the U.S. for studying…


  • IT Security Lessons from the Marriott Data Breach

    A number of data breaches have been disclosed over the course of 2018, but none have been as big or had as much impact as the one disclosed on Nov. 30 by hotel chain Marriott International. A staggering 500 million people are at risk as a result of the breach, placing it among the largest…


  • IT Security Vulnerability Roundup: November 2018

      With a flood of new security flaws disclosed every month, it can be a challenge to keep up. What follows is a look at a dozen vulnerabilities that were disclosed in the past few weeks. 1. Integer Overflow Vulnerability in VMware Workstation, Fusion CVE identifier: CVE-2018-6983 CVSS Base Score: 9.8 The vulnerability: VMware Workstation and Fusion could…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies