Trends

Microsoft 365 Research Highlights Cloud Vulnerabilities

In a sequence that suggests cloud services may be more vulnerable than many think, Proofpoint researchers have demonstrated how hackers could take over Microsoft 365 accounts to ransom files stored o...

Zero Trust: Hype vs. Reality

Just as the development of cannons and other weapons made walls obsolete as a form of defense, sophisticated cyber attacks have made the firewall-perimeter model of cybersecurity equally obsolete. ...

What is a Cyberattack? Types and Defenses

A cyberattack is any action taken by a cyber criminal in an attempt to illegally gain control of a computer, device, network, or system with malicious intent. Cyber criminals may damage, destroy, st...

Some Cybersecurity Startups Still Attract Funding Despite Headwinds

With the plunge in tech stocks and the freeze in the IPO market, the funding environment for cybersecurity startups has come under pressure. According to Pitchbook, the amount of venture capital inve...

Most Security Product Buyers Aren’t Getting Promised Results: RSA Panel

About 90% of security buyers aren't getting the efficacy from their products that vendors claim they can deliver, according to a panel at this week's RSA Conference that also offered some solutions t...

How to Prevent Software Supply Chain Attacks

Software supply chain attacks present an increasingly worrying threat. According to a recent BlueVoyant study, an impressive 97 percent of companies surveyed have been negatively impacted by a securi...

Encryption: How It Works, Types, and the Quantum Future

Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats. While cryptology is thousand...

IDS & IPS Remain Important Even as Other Tools Add IDPS Features

Intrusion detection system (IDS) and intrusion prevention system (IPS) technologies - often combined as intrusion detection and prevention (IDPS) - have been in use for decades, yet they remain impor...

How to Improve SD-WAN Security

As the modern workforce becomes increasingly mobile and enterprises branch out and grow, software-defined wide area networks (SD-WAN) have become a popular choice in the evolution of networking. ...

Security in Milliseconds: Visa Invests in Payment Security as E-Commerce Surges

The COVID-19 pandemic has driven a massive increase in e-commerce spending, doubling to an expected $1 trillion this year, according to Adobe. But that spending surge has brought with it a co...

Latest articles