Please turn on your JavaScript for this page to function normally.
Microsoft
By the end of March no one will remember that Microsoft missed a Patch Tuesday

Like the weather in Minnesota, the March Patch Forecast is unpredictable at best. Be prepared for turbulent times interspersed with moments of calm. Will March Patch Tuesday …

gears
Secure operations automation: Close the gap between security and operations teams

A new voke survey of 318 participants from companies of varying sizes globally, focuses on the need to operationalize security through secure operations automation practices …

stats
Total security appliance market shows positive growth

The total security appliance market showed positive growth in both vendor revenue and unit shipments for the fourth quarter of 2016, according to IDC. Worldwide vendor …

Week in review: Apache servers under attack, machine leaning in infosec

Here’s an overview of some of last week’s most interesting news, podcasts and articles: The six stages of a cyber attack lifecycle High-impact cyber incidents can …

idea
How to patch your security blind spots

One of the most challenging – and interesting, and frustrating – aspects of cybersecurity is the sheer unpredictability of industry developments still to come. Sure, analyzing …

box
New infosec products of the week​: March 10, 2017

Waterproof, scalable and customizable data protection ioSafe released ioSafe Server 5, a fire- and waterproof server designed to eliminate data loss and minimize downtime by …

Cybereason RansomFree
Catch emerging strains of ransomware with RansomFree

In this podcast recorded at RSA Conference 2017, Yoel Eilat, Senior Product Manager at Cybereason, talks about RansomFree – the free, anti-ransomware protection …

magnify
The West African cybercriminal ecosystem is unlike any other

While there is still not an actual underground marketplace, cybercrime is pervasive in the West African region. Specifically, scamming operations. The peculiarities of the …

camera
185,000+ vulnerable Wi-Fi cameras just waiting to be hijacked

A generic wireless camera manufactured by a Chinese company and sold around the world under different names and brands can be easily hijacked and/or roped into a botnet. The …

Apache Struts
Apache servers under attack through easily exploitable Struts 2 flaw

A critical vulnerability in Apache Struts 2 is being actively and heavily exploited, even though the patch for it has been released on Monday. System administrators are …

connection
DevSecOps: Building continuous security into IT and app infrastructures

In this podcast recorded at RSA Conference 2017, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about DevSecOps. Instead of making security a …

quantum
The security threat of quantum computing is real, and it’s coming fast

The threat quantum computers pose on encryption is weighing on the minds of some of the world’s most technologically advanced nations: In 2016 alone, the EU announced a $1.13B …

Don't miss

Cybersecurity news