Trends

Get expert insights into the latest developments in cybersecurity to stay ahead of emerging threats and evolving technologies. Our in-depth analysis covers everything from new attack vectors and vulnerabilities to cutting-edge security solutions and trends.

  • Amazon Alexa Skills Present Security Risks

    Alexa skills are growing in popularity as users look to extend the capabilities of their Alexa devices. Researchers now believe that the rapid adoption of these skills could have implications for information security as they could open Alexa users up to phishing or invasive data collection What is an Amazon Alexa skill? An Amazon Alexa…


  • Passwordless Authentication 101

    Although they are the most common tool used to verify a person’s identity, passwords are the least secure mode of authentication. They can be easily hacked, stolen, or otherwise compromised, which makes them a huge cybersecurity risk factor. More and more businesses are adopting passwordless authentication strategies to minimize this gaping vulnerability, so you may…


  • Cybersecurity Employment Outlook for 2021

    The massive SolarWinds breach drove home the point that the cybersecurity threat only gets worse with time, the stakes higher – and the tools more sophisticated. With the cost of cybercrime estimated to reach $6 trillion globally in 2021, there is a staggering demand for skilled cybersecurity professionals to combat these threats and manage cyber…


  • Apple White Hat Hack Shows Value of Pen Testers

        The best Cybersecurity Awareness Month lesson may have come from Apple, which could ultimately pay bug bounties of around $500,000 to a group of white hat hackers who found 55 vulnerabilities on Apple’s own networks, including 11 critical vulnerabilities. The main lesson is pretty simple: No one is safe, and the need for…


  • Employees and Data Backup Top Cybersecurity Awareness Month Concerns

        October is National Cybersecurity Awareness Month, and as people are the weakest link in the cybersecurity chain, it’s only fitting that this year’s theme is “Do your part: Be CyberSmart.” Whether it’s unintentionally clicking on a malicious link in an email, poor password hygiene, a misconfiguration or a missed patch, human error is…


  • Remote Work Security: Priorities & Projects

    Each year, Gartner analysts recommend 10 security projects that combine high business impact with high risk reduction. Privileged access management (PAM) topped the list in 2018 and 2019. This year, after the COVID-19 pandemic forced nearly half of workers to telecommute, Gartner’s focus has now turned to securing the remote workforce. As if to underscore…


  • Majority of Businesses Plan to Accelerate IT Security Spending and Hiring

    Foster City, CA, Feb. 06, 2019 — eSecurityPlanet.com, a top online resource for IT security professionals and vendors, released its 2019 State of IT Security survey. This year’s results highlight an emerging gulf between companies ready to meet the growing perimeter and insider threats to their security, and those that aren’t, where one in three companies…


  • Why Are Web Applications a Security Risk?

    As users have moved more of their activities to the Web, fraudsters have followed, devoting more of their attention to creating security threats based on Web applications. The shift from desktop-based threats to Web-based threats is changing the way modern IT security needs to be implemented and managed. Web applications by definition are accessible over…


  • How Does Biometric Authentication Work?

    Have passwords outlived their usefulness? Take a look at some of the weak passwords exposed in website breaches this year, and judge for yourself. The frequent usage of weak passwords such as “changeme,” “123abc,” and “Pa$$w0rd” (real-life examples uncovered in the recent breach and defacement of a security software vendor’s website) are a strong indicator…


  • Detecting Malicious Traffic in HTTP Headers

    In the battle against malicious traffic and infected websites, security researchers are always looking for new avenues of detection. According to Trustwave Security Researcher Rodrigo Montoro, one such approach could come from an analysis of HTTP headers to detect potentially malicious traffic. Speaking at the SecTOR security conference in Toronto, Montoro detailed his approach toward…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies