Please turn on your JavaScript for this page to function normally.
target
List of IT assets an attacker is most likely to target for exploitation

Randori released a report that identifies the most tempting IT assets that an attacker is likely to target and exploit. Leading up to the anniversary of the Solarwinds hack, …

bomb
Is the government’s response to cybersecurity threats enough for your organization?

With this year’s attacks against Colonial Pipeline and Kaseya, ransomware and its impact on infrastructure have been pushed to the forefront of American political …

ransomware
Ransomware attacks preparedness lagging, despite organizations being aware of the risks

Hornetsecurity released the results of a global study of IT professionals on their preparedness for ransomware attacks. Survey data showed that although companies are …

KuberLogic
KuberLogic open-source platform turns infrastructure into a managed PaaS

CloudLinux launched a new open-core project – KuberLogic – software that allows DevOps to set up scalable, self-healing PaaS on top of your Kubernetes cluster. Available on …

network
Worldwide supply chains vulnerable as businesses lack visibility into suppliers

BlueVoyant released the findings of its second annual global survey into third-party cyber risk management. The study reveals that 97% of firms surveyed have been negatively …

drown
Cybersecurity shortcomings exposed by the pandemic

SecureAge announced the release of its study which polled 200 employers and 400 employees from around the UK business world during Q3 2021, and examined key cybersecurity …

servers
Investing in the mainframe remains key driver for digital transformation

Leading organizations are investing in the mainframe, innovating with DevOps, and integrating systems and teams to drive digital transformation, according to a BMC survey. …

cloud
Multi-access edge cloud market to grow steadily by 2025

IDC sees 2021 as an accelerated year for multi-access edge cloud (MEC) investments. MEC buildouts are being carried out by a broad cross-section of edge stakeholders (e.g., …

Elasticsearch
Webinar: How to secure your sensitive data in Elasticsearch

Is your Elasticsearch data protected from hackers and common attacks like search injections? Join data security expert and CEO of IronCore Labs Patrick Walsh on November 4th …

money
How to maximize your security budget while demonstrating ROI

The 2021 Positive Technologies Cybersecurity Threatscape report revealed that cyber attacks remain on the rise in the post-pandemic world, increasing by 17% compared to 2020. …

AWS
AWS ransomware attacks: Not a question of if, but when

Ermetic announced the results of a study about the security posture of AWS environments and their vulnerability to ransomware attacks. In virtually all of the participating …

Google Play malware
2021 nastiest malware: Here to stay and ever evolving

This year was yet another year with COVID-19 and malware running rampant in the headlines. Be it in person or online, the world is still struggling in the fight against …

Don't miss

Cybersecurity news