Survey: Cybersecurity Pros Believe They Should Have the Right to ‘Hack Back’ (CBR)

At a recent IT event several discussions took place around the topic of cyberattacks from nation state actors, a survey conducted found that 87% of security professionals believe t... More

Research: 80% of Security Pros Have Trouble Finding Skilled Workers (Tech Republic)

IT hiring managers have had trouble finding the right tech talent for a while, but this is mainly due to constantly changing threat vectors and emerging technology, the report foun... More

IT and Security Need to Start Playing Nice – Here’s How (Forbes)

Several technology trends are making it more important and difficult than ever for NetOps and SecOps teams to work together. Increased complexity, the explosive growth of cloud mig... More

IBM X-Force Red Launches New Service for Blockchain Security Testing (CDSA)

IBM Security's team of offensive security experts, X-Force Red, announced the launch of a new blockchain testing service to help identify weaknesses and strengthen security of a wi... More

A CEO Cheat Sheet for the Cybersecurity Big One (Forbes)

Breaches have become so commonplace they feel like they've become an accepted part of business as usual, but complacency is a mistake. In the Conference Board's 2019 C-Suite survey... More

Microsoft Azure Sentinel Moves SIEM to the Cloud (SDxCentral)

Ahead of the annual RSA Conference, Microsoft rolled out a new cloud-native security information and event management (SIEM) tool called Azure Sentinel, and a managed threat huntin... More

How Cybersecurity Skill Shortage is Impacting Incident Response (CIO Dive)

Cybersecurity reports tend to paint a pretty abysmal picture for companies. At the very least, they shed light on the impossibility of complete protection. The inability to properl... More

2019 Vulnerability Stats Report Out From edgescan (HITS)

edgescan released their "Vulnerability Stats Report 2019" which describes both internal and external facing risks faced by typical organizations across the entire stack from a cybe... More

7 Mobile Security Threats You Should Take Seriously in 2019 (IT World)

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these seven issues this year.... More

Five Cybersecurity Trends to Watch for in 2019 (Forbes)

4. User Awareness. Businesses will find it critical to keep their eyes peeled in 2019 for any potential risk that can come from their own users. This may include potential harm ari... More

Cybersecurity Starts with Access Control (Forbes)

Humans are often pegged as the weakest link in cybersecurity -- and to a great extent, that’s true. While training employees to think like hackers can certainly make your company... More

Cybersecurity Success Still Depends on Getting the Basics Right (Tech Wire Asia)

Cybersecurity is a big concern for most businesses, especially because of the regulatory scrutiny it attracts and the loss of consumer confidence it results in. And although hacker... More

Moving to the Hybrid Cloud? Make Sure It’s Secure by Design (Security Intelligence)

Many organizations have such a positive first experience with cloud computing that they quickly want to move to a hybrid cloud environment with data and workloads shared between pr... More

The Cloud’s Weakest Security Links Aren’t Where You’re Looking (InfoWorld)

You pride yourself on your cloud computing security strategy and tool stack. Indeed, your system made up of many security solutions is both proactive, and self-updating. So, you’... More

Old Password Habits Die Hard … If They Ever Die at All (DXC Technology Blog)

If there’s anything that security and IT teams hate more than managing credentials, I certainly can’t think of it. Users hate having to manage their passwords and they tend to ... More

Email Attacks Increasingly Using Compromised Accounts (IT Pro Portal)

Hackers are realising that it’s easier to defraud someone if you’re using a legitimate email address, rather than creating one yourself. With that in mind, they’re increasing... More

Data Security is a Major Issue in GDPR Compliance (ZDNet)

The EU's General Data Protection Regulation sent organizations across Europe into a tailspin over their data storage and privacy procedures, and months on, only 59 percent of compa... More

Data Security Being Left Behind in Digital Transformation (IT Pro Portal)

Some companies looking to digitally transform are trying to run before walking, putting themselves and their customers at grave cybersecurity risks. This is according to a new repo... More

U.S. Race for 5G Could Leave Networks Unsecure (Tech HQ)

The United States’ race against China to deploy fifth-generation networks could leave them lacking adequate security measures and open to international or domestic cyber attacks.... More

Microsoft Launches Azure DevOps Bug Bounty Program, $20,000 Rewards on Offer (ZDNet)

Microsoft has launched a new bug bounty program for the Azure DevOps cloud service with rewards of up to $20,000 on offer for interested researchers. On Thursday, Microsoft reveale... More