The threat landscape is evolving at an unprecedented pace, and 2025 is shaping up to be a pivotal year for security professionals ...
I was recently asked “What do intelligence reports do? They appear worthless!” I found the question both funny and ironic. Unfortunately, I had to gently deliver some uncomfortable news. There is ...
As software supply chain risks rise, regulatory authorities are increasingly requiring organizations to adopt software bills of materials (SBOMs) for security and compliance ...
Refine your cybersecurity strategies to navigate the challenges of a VUCA (volatility, uncertainty, complexity, and ambiguity) environment ...
Paged at 3 a.m. again … we had another breach to respond to in the security operations center (SOC). While the incident response team was busy delegating roles and responsibilities, I was ...
Halloween-themed spam has risen sharply this season, with Bitdefender reporting that 40% of these emails contain malicious content designed to scam users or harvest personal data. In the first half of October ...
Artificial intelligence (AI) is emerging as a top concern in the cybersecurity world, with 48% of respondents identifying it as the most significant security risk facing their organizations, according to a HackerOne ...
A full 80% of organizations within the critical infrastructure vertical experienced email-related security breaches in the past year, according to an OPSWAT survey ...
There has been a dramatic rise in email attacks and ransomware incidents, with an Acronis report noting a staggering 293% increase in email attacks in the first half of 2024 compared to ...
Appdome Eliminating Information Asymmetry in the Attack Chain With GenAI In the rapidly evolving landscape of mobile security, staying ahead of attackers requires more than robust defense mechanisms. It demands a comprehensive ...
2025 predictions: Threats
Is Cyber Threat Intelligence Worthless?
Gartner report: How SBOMs improve security and compliance in the software supply chain
Gartner Report: How to Respond to the Threat Landscape in a Volatile, Complex and Ambiguous World
Application Detection and Response (ADR): A Game-changing SOC Analyst Tool | Contrast Security
Spooky Spam, Scary Scams: Halloween Threats Rise
Security Professionals Cite AI as Top Security Risk
Email Security Breaches Rampant Among Critical Infrastructure Organizations
Email Attacks Surge, Ransomware Threat Remains Elevated
Eliminating Information Asymmetry in the Attack Chain With GenAI