Proactive software supply chain security becoming critical as threats rise

Anchore released its second annual report of executive insights into managing enterprise software supply chain security practices. The report compiles responses from 428 leaders and executives in IT, security and development roles to identify the lates… Continue reading Proactive software supply chain security becoming critical as threats rise

Buy now, pay later fraud, romance and cryptocurrency schemes top the list of threats this year

Experian released its annual forecast, which reveals five fraud threats for the new year. With consumers continuing to take a digital-first approach to everything from shopping, dating and investing, fraudsters are finding new and innovative ways to co… Continue reading Buy now, pay later fraud, romance and cryptocurrency schemes top the list of threats this year

How to achieve greater cyber resiliency

Spurred on by economic shutdowns, cyber criminals have become more cunning and brazen than ever before, executing ransomware attacks against organizations of all sizes across all industries. JBS Meats, Colonial Pipeline, Air India and CWT Global are am… Continue reading How to achieve greater cyber resiliency

What’s in for mobile operators this year?

Nation states will ramp up mobile cyber attacks; hyperscalers will mimic Google and introduce powerful proprietary encryption protocols; and new edge clouds could make the last mile vulnerable. These are amongst the major 2022 mobile industry trends tr… Continue reading What’s in for mobile operators this year?

DDoS protection and mitigation market to reach $6.7 billion by 2026

The global DDoS protection and mitigation market size is expected to grow from $3.3 billion in 2021 to $6.7 billion by 2026, at a Compound Annual Growth Rate (CAGR) of 15.1% from 2021 to 2026, according to ResearchAndMarkets. The major factors fueling … Continue reading DDoS protection and mitigation market to reach $6.7 billion by 2026

EU launches bug bounty programs for five open source solutions

The European Union is, once again, calling on bug hunters to delve into specific open source software and report bugs. This time around, the list of software that should be probed for weaknesses includes: LibreOffice – a free office suite Mastodo… Continue reading EU launches bug bounty programs for five open source solutions

53% of medical devices have a known critical vulnerability

After a year of unprecedented ransomware attacks on hospitals and healthcare systems – and with healthcare now the #1 target for cybercriminals – critical medical device risks in hospital environments continue to leave hospitals and their patients vuln… Continue reading 53% of medical devices have a known critical vulnerability

Why organizations should consider adopting cloud governance as code

Cloud governance, in terms of enforcing cost, compliance, and security policies tends to be a pivotal inhibitor to cloud adoption (86% of the respondents) and is a top priority for organizations in the new year, a Stacklet survey reveals. 57% of the re… Continue reading Why organizations should consider adopting cloud governance as code

AI to greatly enhance urban surveillance technologies

Urban surveillance and public safety technologies are finding new use cases following the COVID-19 pandemic and increasing AI capabilities. COVID-19 has spurred the use of technologies, such as crowd monitoring, which are here to stay. ABI Research for… Continue reading AI to greatly enhance urban surveillance technologies

Healthcare fraud detection market to grow steadily by 2026

43% of the growth will originate from North America for the healthcare fraud detection market. The US and Canada are the key markets for healthcare fraud detection in North America. Market growth in North America will be faster than the growth of the m… Continue reading Healthcare fraud detection market to grow steadily by 2026