Wi-Fi evolution tightens focus on access control

Wi-Fi networks are taking on heavier workloads, more devices, and higher expectations from users who assume constant access everywhere. A new Wireless Broadband Alliance industry study shows that this expansion is reshaping priorities around security, … Continue reading Wi-Fi evolution tightens focus on access control

IPFire update brings new network and security features to firewall deployments

Security and operations teams often work with firewall platforms that require frequent tuning or upgrades to meet evolving network demands. IPFire has released its 2.29 Core Update 199, aimed at network and protection teams that manage this open source… Continue reading IPFire update brings new network and security features to firewall deployments

Cybercriminals are scaling phishing attacks with ready-made kits

Phishing-as-a-Service (PhaaS) kits lower the barrier to entry, enabling less-skilled attackers to run large-scale, targeted phishing campaigns that impersonate legitimate services and institutions, according to Barracuda Networks. Phishing kits grow mo… Continue reading Cybercriminals are scaling phishing attacks with ready-made kits

StackRox: Open-source Kubernetes security platform

Security teams spend a lot of time stitching together checks across container images, running workloads, and deployment pipelines. The work often happens under time pressure, with engineers trying to keep clusters stable while meeting internal policy r… Continue reading StackRox: Open-source Kubernetes security platform

What European security teams are struggling to operationalize

European security and compliance teams spend a lot of time talking about regulation. A new forecast report from Kiteworks suggests the harder problem sits elsewhere. According to the report, many European organizations have strong regulatory frameworks… Continue reading What European security teams are struggling to operationalize

Identity security planning for 2026 is shifting under pressure

Identity security planning is becoming more focused on scale, governance, and operational strain, according to the Identity Security Outlook 2026 report. The ManageEngine research draws on responses from 515 identity and security leaders in the United … Continue reading Identity security planning for 2026 is shifting under pressure

The roles and challenges in moving to quantum-safe cryptography

A new research project examines how organizations, regulators, and technical experts coordinate the transition to quantum safe cryptography. The study draws on a structured workshop with public sector, private sector, and academic participants to docum… Continue reading The roles and challenges in moving to quantum-safe cryptography

Product showcase: Blokada for Android gives users control over network traffic

Blokada is a network privacy and ad-blocking application available on Android, iOS, Windows, macOS, and Linux. It is designed to reduce ads, block trackers, and limit unwanted network connections at the system level. Getting started Blokada’s interface… Continue reading Product showcase: Blokada for Android gives users control over network traffic

What security teams miss in email attacks

Email remains the most common entry point for attackers. This article examines how phishing, impersonation, and account takeover continue to drive email breaches and expose growing security gaps across industries. Email blind spots are back to bite sec… Continue reading What security teams miss in email attacks