Category: EN

Cybersecurity classics: 10 books that shaped the industry

Cybersecurity constantly evolves, but some books have stood the test of time, shaping how professionals think about security, risk, and digital threats. Whether you’re a CISO, a seasoned expert, or cybersecurity enthusiast, these must-reads belong on your shelf. Masters of…

Confidence Gap in Cybersecurity Leaves Businesses at Risk

New research has revealed that although 86% of employees believe they can confidently identify phishing emails, nearly half have fallen for scams.   The study, conducted by KnowBe4, surveyed professionals in the UK, USA, Germany, France, Netherlands, and South Africa and…

New Bill Aims to Strengthen Cybersecurity for Federal Contractors

The House of Representatives has passed a bill that mandates contractors working with the federal government implement vulnerability disclosure policies (VDPs) in alignment with NIST guidelines.    The Federal Contractor Cybersecurity Vulnerability Reduction Act of 2025, introduced by Chairwoman Nancy Mace…

WatchGuard unveils FireCloud Internet Access

WatchGuard® Technologies, a provider of unified cybersecurity, has announced the launch of FireCloud Internet Access, the first in what it’s describing as “a new family of hybrid secure access service edge (SASE) products”. The company said that FireCloud “uniquely meets…

Multiple Zoom Client Vulnerabilities Exposes Sensitive Data

Recent security disclosures reveal multiple high-severity vulnerabilities in Zoom’s client software, exposing millions of users to potential data breaches, privilege escalation, and unauthorized access.  The most critical flaws, patched in Zoom’s March 11, 2025, security bulletin, include CVE-2025-27440 (heap-based buffer…

China-linked APT UNC3886 targets EoL Juniper routers

Mandiant researchers warn that China-linked actors are deploying custom backdoors on Juniper Networks Junos OS MX routers. In mid-2024, Mandiant identified custom backdoors on Juniper Networks’ Junos OS routers, and attributed the attacks to a China-linked espionage group tracked as UNC3886.…

Statement on CISA’s Red Team

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA News Read the original article: Statement on CISA’s Red Team

What key metrics indicate NHI performance in DevOps?

What Do Non-Human Identities Bring to the Table in DevOps? Where constant innovation and rapid deployment are the norms, have you ever wondered how Non-Human Identities (NHIs) and Secrets Security Management fit into the picture? If you answered yes, then…

How do I secure dynamic NHIs in a microservices architecture?

Should We Be Concerned About the Security of Dynamic NHIs in a Microservices Architecture? The advent of dynamic Non-Human Identities (NHIs) in a microservices architecture has undoubtedly added a new dimension to cybersecurity. But with this innovation comes an increased…