Get expert insights on the latest developments in cybersecurity to stay ahead of the curve.

  • 5 Ways to Configure a SIEM for Accurate Threat Detection

    A security information and event management (SIEM) system is about as complicated as a security tool can get, pulling in log and threat data from a wide range of sources to look for signs of a cyber attack. Not surprisingly, they can be challenging to manage. A recent Gurucul survey of over 230 security pros… Read more

  • How Generative AI Will Remake Cybersecurity

    In March, Microsoft announced its Security Copilot service. The software giant built the technology on cutting-edge generative AI – such as large language models (LLMs) – that power applications like ChatGPT. In a blog post, Microsoft boasted that the Security Copilot was the “first security product to enable defenders to move at the speed and… Read more

  • New Apple RSR Flaw Blocks MDM Functionality on macOS Devices

    Addigy, which provides management solutions for Apple devices, today warned that Apple’s new Rapid Security Response (RSR) updates aren’t being delivered to as many as 25 percent of macOS devices in managed environments, and that the failure to do so is also impacting mobile device management (MDM) stacks on those devices. RSR updates are new… Read more

  • Top 25 Cybersecurity Experts & Accounts to Follow on Twitter

    Keep up with the latest cybersecurity news and trends. Check out our list of the top cybersecurity Twitter accounts to follow now. Read more

  • Biden Cybersecurity Strategy: Big Ambitions, Big Obstacles

    The White House’s National Cybersecurity Strategy unveiled yesterday is an ambitious blueprint for improving U.S. cybersecurity and threat response, but some of the more ambitious items will take time to implement, and could face opposition from Congress. President Biden came into office around the time of the SolarWinds and Colonial Pipeline cyber attacks, so cybersecurity… Read more

  • Wireless Security: WEP, WPA, WPA2 and WPA3 Explained

    Wireless security is the protection of wireless networks, devices and data from unwanted access and breaches. It involves a variety of strategies and practices designed to preserve the confidentiality, integrity and availability of wireless networks and their resources. Wireless security is critical because these networks are subject to eavesdropping, interception, data theft, denial of services… Read more

  • 9 Best Cybersecurity Podcasts for Security Pros

    Cybersecurity podcasts are an easy way to immerse yourself in the world of SecOps. Depending on what you’re looking for, you can catch up on the latest news and hear analysis from experts in the field or take a deep dive into a major cybersecurity story or concept. The best part? You can listen while… Read more

  • Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats

    ChatGPT has raised alarm among cybersecurity researchers for its unnerving ability in composing everything from sophisticated malware to phishing lures – but it’s important to keep in mind that the tool can help support cybersecurity defenses as well. Shiran Grinberg, director of research and cyber operations at Cynet, told eSecurity Planet that too many companies… Read more

  • Cybersecurity in the Metaverse Will Require New Approaches

    Despite challenges faced by Meta and others, there remains optimism for the metaverse. The PwC 2022 U.S. Metaverse Survey highlights this. The survey, which included over 5,000 consumers and 1,000 U.S. business leaders, shows that half of consumers consider the metaverse to be exciting, and 66% of executives say their companies are actively engaged with… Read more

  • Researchers’ Quantum Threat Debunked, RSA Safe for Now

    In a paper published late last month, 24 Chinese researchers suggested that RSA-2048 encryption could be broken using a quantum computer with 372 physical quantum bits. Cryptographer Bruce Schneier drew attention to the paper [PDF] last week in a blog post, noting that IBM recently announced a 433-qubit quantum computer, far exceeding the researchers’ stated… Read more

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis