Trends

Hacking Linux is Easy with PwnKit

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added PwnKit as a high-severity Linux vulnerability to its list of actively exploited bugs. Recorded as CVE-2021-4034, with a C...

Hyperautomation and the Future of Cybersecurity

Next-gen AI systems are now baked into just about every category of software—but Gartner believes we can automate even further. For the last few years, Gartner has predicted that hyperautomation woul...

Microsoft 365 Research Highlights Cloud Vulnerabilities

In a sequence that suggests cloud services may be more vulnerable than many think, Proofpoint researchers have demonstrated how hackers could take over Microsoft 365 accounts to ransom files stored o...

Zero Trust: Hype vs. Reality

Just as the development of cannons and other weapons made walls obsolete as a form of defense, sophisticated cyber attacks have made the firewall-perimeter model of cybersecurity equally obsolete. ...

What is a Cyberattack? Types and Defenses

A cyberattack is any action taken by a cyber criminal in an attempt to illegally gain control of a computer, device, network, or system with malicious intent. Cyber criminals may damage, destroy, st...

Some Cybersecurity Startups Still Attract Funding Despite Headwinds

With the plunge in tech stocks and the freeze in the IPO market, the funding environment for cybersecurity startups has come under pressure. According to Pitchbook, the amount of venture capital inve...

Most Security Product Buyers Aren’t Getting Promised Results: RSA Panel

About 90% of security buyers aren't getting the efficacy from their products that vendors claim they can deliver, according to a panel at this week's RSA Conference that also offered some solutions t...

How to Prevent Software Supply Chain Attacks

Software supply chain attacks present an increasingly worrying threat. According to a recent BlueVoyant study, an impressive 97 percent of companies surveyed have been negatively impacted by a securi...

Encryption: How It Works, Types, and the Quantum Future

Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats. While cryptology is thousand...

IDS & IPS Remain Important Even as Other Tools Add IDPS Features

Intrusion detection system (IDS) and intrusion prevention system (IPS) technologies - often combined as intrusion detection and prevention (IDPS) - have been in use for decades, yet they remain impor...

Latest articles