Security News

Discover insights from 900 security leaders across the globe in IDC’s Voice of Security 2025 survey, sponsored by Tines in partnership with AWS. Understand the biggest challenges facing security...

The cyber world needs your expertise. But the security leaders of tomorrow require a broad set of skills that job experience alone does not arm you with. What do today’s organizations demand? And...

The ultimate guide to AI security: key AI security risks, vulnerabilities and strategies for protection. 61% of companies use AI, but few secure it. This whitepaper covers the key AI risks being...

The cybersecurity skills gap presents ongoing challenges worldwide, so organizations are scrambling to fill cloud security positions. Having a subject matter expert on staff qualified to advise on...

Implementing multicloud solutions is becoming increasingly paramount for organizations seeking to drive their business forward in the coming years. As a result, the role of cloud security is...

In the DevSecOps Blueprint whitepaper, GitGuardian outlines a robust foundation for building an automated and technology-driven DevSecOps Program that addresses every aspect of the SDLC. Learn how your organization can embed security at every layer: the tools and technologies, the processes, and the people involved. Help your developers work faster while maintaining security.

Microsoft's Azure AD Password Protection, now rebranded as Microsoft Entra ID helps users create a password policy they hope will protect their systems from account takeover and other identity and access management issues. The absence of Dark Web data usage in Microsoft Entra ID's security measures poses a considerable risk to businesses by not adequately protecting against compromised credentials.

Please turn on your JavaScript for this page to function normally. While a valuable tool in the cybersecurity toolkit, MFA is not immune to weaknesses.

20 cybersecurity projects on GitHub you should check outOpen-source GitHub cybersecurity projects, developed and maintained by dedicated contributors, provide valuable tools, frameworks, and resources to enhance security practices. How to make developers love securityStories of the tension between developers and security teams are a longstanding feature of the software industry, stemming from the friction that security is often perceived to create.

This list of free cybersecurity whitepapers that don't require registration covers a wide range of common cyber risks. To establish a robust and successful security program for industrial control systems or operational technology, a combination of five cybersecurity controls can be employed.