Don't let mistakes bother you

If you don't care, you may become a victim of spam

Want to get ahead? Four activities that can enable a more proactive security regime

Hockey legend Wayne Gretzky famously shared his secret to success on the ice: “I skate to […]

Protecting Against Business Email Compromise (BEC): A Comprehensive Guide

Business Email Compromise (BEC) attacks have emerged as one of the most sophisticated and financially devastating […]

What’s next after the CISO role?

Few roles have changed as much as the chief information security officer in the nearly 30 […]

Updating secure boot is crucial to keeping systems secure and working properly

New security features are great, but it’s inevitable that bad actors will eventually find ways around […]

Apache OFBiz patches new critical remote code execution flaw

Developers of Apache OFBiz, an open-source enterprise resource planning (ERP) framework, have released a patch for […]

Two weeks on from Pavel Durov’s arrest, Telegram ramps up moderation of ‘illegal content’

Less than two weeks after Telegram founder and CEO Pavel Durov’s high-profile arrest by French police, […]

Ransomware Attacks Reach Record Highs: Demands and Payments Continue to Soar

As IT complexity continues to rise, businesses are facing an increasingly challenging cybersecurity environment. Ransomware attacks […]

New malicious MS Office macro clusters discovered

CISOs with IT environments running older versions of Microsoft Office must upgrade immediately or risk the […]

Adobe evolves its risk management strategy with homegrown framework

Digital business has transformed virtually everything for enterprises — and it has brought with it cybersecurity […]

US charges 5 Russian spies for Ukraine, NATO cyberattacks

Five officers of the Russian military intelligence service, the GRU, and an alleged civilian collaborator were […]