Please turn on your JavaScript for this page to function normally.
structure
Week in review: MongoDB attacks, hackers hitting F5 BIG-IP, Citrix devices, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles and reviews: Attackers are probing Citrix controllers and gateways through recently …

patch
July 2020 Patch Tuesday forecast: Will the CVE trend continue?

Microsoft has averaged roughly 90 common vulnerabilities and exposures (CVE) fixes per month over the past five months. With everyone working from home and apparently focused …

cloud
An effective cloud security posture begins with these three steps

Public cloud adoption continues to surge, with roughly 83% of all enterprise workloads expected to be in the cloud by the end of the year. The added flexibility and lower …

USB
USB storage devices: Convenient security nightmares

There’s no denying the convenience of USB media. From hard drives and flash drives to a wide range of other devices, they offer a fast, simple way to transport, share and …

idea
Companies see the importance of integrated solutions to streamline business processes

A study by Beagle Research Group surveyed more than 500 employees at businesses of varying sizes and industries throughout North America, examining the dimensions affecting …

Cyberspace Solarium Commission
Three major gaps in the Cyberspace Solarium Commission’s report that need to be addressed

Released in March 2020, the Cyberspace Solarium Commission’s report urges for the U.S. government and private sector to adopt a “new, strategic approach to cybersecurity,” …

cloud
70% of organizations experienced a public cloud security incident in the last year

70% of organizations experienced a public cloud security incident in the last year – including ransomware and other malware (50%), exposed data (29%), compromised accounts …

laptop
In the age of disruption, comprehensive network visibility is key

IT teams require comprehensive visibility into the network driven by a number of factors, including tremendous disruption from the COVID-19 pandemic, relentless technological …

MongoDB
MongoDB is subject to continual attacks when exposed to the internet

On average, an exposed Mongo database is breached within 13 hours of being connected to the internet. The fastest breach recorded was carried out 9 minutes after the database …

camera
Exposing the privacy risks of home security cameras

An international study has used data from a major provider of home IP security cameras to evaluate potential privacy risks for users. Privacy-compromising information IP home …

healthcare
Business efficiency metrics are more important than detection metrics

With cyberattacks on the rise, today’s security professionals are relying primarily on detection metrics – both key performance indicators (KPIs) and key risk indicators …

Elasticsearch
Elasticsearch security: Understand your options and apply best practices

The ever-escalating popularity of Elasticsearch – the distributed open source search and log analytics engine that has become a staple in enterprise application developers’ …

Don't miss

Cybersecurity news