Microsoft Launches Azure DevOps Bug Bounty Program, $20,000 Rewards on Offer (ZDNet)

Microsoft has launched a new bug bounty program for the Azure DevOps cloud service with rewards of up to $20,000 on offer for interested researchers. On Thursday, Microsoft reveale... More

Light Point Security Recognized as One of the Top 10 Information Security Providers of 2018 (HITS)

Light Point Security, the pioneer of Browser Isolation, today announced that it has been named one of the Top 10 Information Security Solution Providers of 2018 by Enterprise Secur... More

The CISO’s New Role in Making Modern IT Work (Avanade Insights)

Cybersecurity — once relegated as an after-thought to the IT department — has emerged as a key concern of the board and C-Suite, thanks to the changing nature of work and produ... More

Is It Time for Enterprises to Bid Farewell to BYOD? (Security Intelligence)

For more than a decade, the explosive popularity of smartphones and mobile devices has had a direct impact on where and when employees perform work tasks. Before, when employees on... More

Three Top Trends That Will Impact Cybersecurity Strategies in 2019 (IM)

Effectively managing cybersecurity continues to be a top challenge for enterprise. More and more companies are undergoing digital transformation, and the tools and technologies wit... More

4 InfoSec Trends for 2019 (CMS Wire)

The first step in minimizing risk is to determine whether your company has sensitive data that is unmanaged on repositories like shared drives and Sharepoint platforms. It’s also... More

Fortium Debuts Secure Player for MediaSeal Customers (HITS)

MediaSeal encryption while you work is already a staple for protecting sensitive content throughout media workflows, at over 300 worldwide locations. Now Fortium has debuted a new ... More

10 Top Cybersecurity Predictions for 2019 (IM)

Cyber attacks and data breaches continue to increase in both frequency and intensity, and organizations can expect more of the same in 2019. Here are 10 trends that are putting fir... More

Are Mobile Devices the Achilles’ Heel of Your Cyber Defense? (Tech HQ)

In today’s always-on working environment, it’s not unusual to be checking your emails from your smartphone on the commute to work, or perhaps be making a quick edit to a slide ... More

Survey: IT Security Pros Embrace – But Fear – Artificial Intelligence (DXC Technology Blog)

Roughly seven out of eight IT security professionals believe artificial intelligence (AI) would help improve enterprise security, according to a recent survey. But nearly as many r... More

Google Cloud Expands Partnership with Palo Alto Networks (NDTV)

Google Cloud has announced to expand its partnership with global cyber-security company Palo Alto Networks to simplify security and accelerate cloud adoption. Palo Alto Networks wi... More

IT Leaders Spend 10% More Money Improving Customer Experience Than Security (Tech Republic)

IT decision makers are allocating 10% more funding toward improving customer experience than to security measures, according to a new survey. From a sales standpoint, this finding ... More

NSS Labs Announces Results of 2018 Web Browser Security Test (HITS)

NSS Labs announced the release of its 2018 Web Browser Security Comparative Reports. These reports examine the abilities of three leading web browsers to protect users from sociall... More

Fight Evolving Cybersecurity Threats With a One-Two-Three Punch (Security Intelligence)

Today, the volume of threats is so overwhelming that getting ahead is often unrealistic. It’s not a matter of if you’ll have a breach, it’s a matter of when — and how quick... More

The Growing Importance of Cybersecurity Skills (Forbes)

Cybercrime costs the U.K. several billion pounds per year. Indeed, a recent government report showed that 46% of all businesses identified at least one cyber attack in the last yea... More

Top Four Cybersecurity Trends for the Year Ahead (Forbes)

Internet-Enabled Devices Are Everywhere: Internet of things devices are becoming more and more widespread, and that trend isn’t slowing any time soon. IoT devices are difficult t... More

How to Prepare for the Coming 5G Security Threats (Security Intelligencer)

Over the next few years, the pace of business will accelerate exponentially. 5G will enable the future enterprise technologies everyone is predicting and waiting for: fleets of sel... More

How to Secure APIs, the New Shadow IT (New Stack)

API growth has risen exponentially over the past five years: an average of nearly 2,000 new web APIs have been added each year since 2014 (and there were less than 2,000 back in 20... More

Security Trends Your Company Needs to Embrace in 2019 (Entrepreneur)

3. The authentication revolution. Even though the value of the information we store online continuously grows larger, the tools we use to keep that data safe remain woefully obsole... More

Study: IT Professionals Concerned About Cyberwarfare, End Users, Conducting International Business (ZDNet)

It's not a matter of "if" companies will become a victim of a cyberwarfare or cybersecurity attack but "when," as both types of attacks grow more sophisticated daily, putting milli... More