Category: EN

Flexible working models fuel surge in device theft

76% of respondents have been impacted by incidents of device theft in the past two years, with incidents more common in organizations with more flexible working models, according to Kensington. For instance, research revealed that 85% of organizations with flexible…

Lazarus APT Attacking Organizations by Exploiting One-Day vulnerabilities

Cybersecurity experts have identified a sophisticated campaign by the North Korean state-sponsored Lazarus APT group targeting critical infrastructure and financial organizations worldwide. The threat actor has shifted tactics to exploit recently patched vulnerabilities—known as one-day vulnerabilities—before organizations can implement necessary…

Exposure validation emerges as critical cyber defense component

Organizations have implemented various aspects of threat exposure validation, including security control validation (51%) and filtering threat exposures based on the effectiveness of security controls to mitigate threats (48%), according to Cymulate. At the same time, nearly all respondents say…

Top must-visit companies at RSAC 2025

RSAC 2025 Conference is taking place at the Moscone Center in San Francisco from April 28 – May 1. With hundreds of booths, countless product demos, and nonstop buzz, navigating RSAC can be overwhelming. That’s why we’ve done the legwork…

13 core principles to strengthen AI cybersecurity

The new ETSI TS 104 223 specification for securing AI provides reliable and actionable cybersecurity guidance aimed at protecting end users. Adopting a whole-lifecycle approach, the framework outlines 13 core principles that expand into 72 detailed, trackable principles across five…

New infosec products of the week: April 25, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Bitdefender, PowerDMARC, Skyhawk Security, Stellar Cyber, Swimlane, and Veracode. Email authentication simplified: How PowerDMARC makes DMARC effortless With PowerDMARC, users can generate and publish DMARC,…

Empowered by Better Secrets Vaulting

Why is Secrets Vaulting a Critical Component of Modern Cybersecurity? Several organizations have stepped up to embrace digital transformation, only to overlook a crucial aspect of cybersecurity- Non-Human Identities (NHIs) and Secrets Security Management. Without effective secrets vaulting, organizations are…

Feel Reassured with Enhanced Data Security

How Can We Mitigate Security Risks? Finding an answer to this pressing question is crucial. The answer often lies in focusing on enhanced data security. While organizations are transitioning to digitized platforms, protecting digital assets becomes paramount. Where does enhanced…

Is Your Cybersecurity Scalable Enough?

Are Your Cybersecurity Efforts Truly Scalable? A question all organizations grapple with: is your cybersecurity infrastructure ready to adapt, evolve and scale alongside your business? Achieving scalable cybersecurity solutions forms the bedrock of data protection strategies. Not just from the…

Calm Your NHI Management Concerns

What if You Could Calm Your NHI Management Concerns? Where businesses are migrating to the cloud at an astonishing pace, the security of Non-Human Identities (NHIs) and their associated secrets has become an absolutely critical concern. NHIs and their associated…

8 simple ways Mac users can better protect their privacy

Just because you’re running Apple’s rock-solid operating system doesn’t mean your privacy is automatically protected. These simple steps will keep you safer. This article has been indexed from Latest stories for ZDNET in Security Read the original article: 8 simple…