Please turn on your JavaScript for this page to function normally.
patch
December 2022 Patch Tuesday forecast: Fine-tuning the connectivity

Microsoft wrapped up a lot of ‘loose ends’ last month with their November set of updates, but there is still some work to do before the end-of-year holiday season. The …

New infosec products of the week: December 9, 2022

Here’s a look at the most interesting products from the past week, featuring releases from 1Password, Arkose Labs, Kudelski Security, Lepide, OPSWAT, Palo Alto Networks, and …

open source
Research reveals where 95% of open source vulnerabilities lie

New research from Endor Labs offers a view into the rampant but often unmonitored use of existing open-source software in application development and the dangers arising from …

hole
Insights into insider threats: Detecting and monitoring abnormal user activity

A cyber security risk that comes from within an organization is referred to as an insider threat. Insider threats might be carried out purposefully or accidentally. Whatever …

PCI
PCI Secure Software Standard 1.2 released

PCI Security Standards Council (PCI SSC) published version 1.2 of the PCI Secure Software Standard and its supporting program documentation. The PCI Secure Software Standard …

compliance
Why automation is critical for scaling security and compliance

As companies are modernizing their tech stacks, many are unwittingly putting their business and customers at risk. Why? Because technology moves faster than teams can keep …

zero trust
Leveraging the full potential of zero trust

More than 90% of IT leaders who have started migrating to the cloud have implemented, are implementing, or are planning to implement a zero-trust security architecture, …

hands
Data protection and security in 2023

Change is the only constant. How we think about data protection, rules and regulations, and the changing of organizational structure is evolving. The good news is that …

dark
Cybercriminals are scamming each other, tipping off law enforcement

Cybercriminals are scamming each other out of millions of dollars and use arbitration to settle disputes about the scams, according to Sophos. For this report, Sophos experts …

IoT
How IoT is changing the threat landscape for businesses

Where IoT-enabled devices connect to wider networks, their potential functionalities are immense, with countless applications across various industries, including production …

SMS
Consumers prioritize mobile app security over features

Appdome unveiled the results of a global survey that shares the views of 25,000 consumers in 11 countries on mobile app use and consumer expectations of mobile app security. …

programmer
How compliance leaders can encourage employees to report misconduct

As Chief Compliance Officers (CCOs) continue to face challenges in restoring employee misconduct reporting to pre-pandemic levels, there are three strategies they should …

Don't miss

Cybersecurity news