Please turn on your JavaScript for this page to function normally.
User key
Centrify Identity Platform now secures Mac endpoints

Centrify announced enhancements to the Centrify Identity Platform that deliver local administrator password management for Macs and Mac application management and software …

Duo Security
Enterprise endpoint security: Millions of devices still running outdated systems

Duo Security analyzed the security health of 4.6 million endpoint devices, including 3.5 million mobile phones across multiple industries and geographic regions. With …

cloud
High-Tech Bridge named a Cool Vendor by Gartner

High-Tech Bridge has been named a Cool Vendor in Gartner’s May 2017 research “Cool Vendors in Security for Midsize Enterprise 2017” by Adam Hils. High-Tech …

idea
It’s time for a common sense security framework

Privacy Rights Clearinghouse maintains a database of every data breach made public since 2005, and as the total number of records rapidly approaches one billion, board …

IoT
The cost of IoT hacks: Up to 13% of revenue for smaller firms

Nearly half of U.S. firms using an Internet of Things (IoT) network have been hit by a recent security breach, which can cost up to 13% of smaller companies’ annual revenue, …

Police
Police dismantle organised crime network suspected of online payment scams

The Polish National Police, working in close cooperation with its law enforcement counterparts in Croatia, Germany, Romania and Sweden, alongside Europol’s European Cybercrime …

Abstract
Week in review: Fireball malware infects 250 million computers, attacks within the Dark Web

Here’s an overview of some of last week’s most interesting news and articles: OneLogin suffers data breach, again OneLogin, a popular single sign-on service that …

EU flag
FTSE companies lack secure data collection methods

With less than a year remaining until the commencement of the GDPR, new research reveals that more than one-third of all public web pages of FTSE 30 companies capturing …

open lock
Weak DevOps cryptographic policies increase financial services cyber risk

Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications. This is …

firefighters
Fireball malware infected 250 million computers worldwide

Check Point researchers discovered a high volume Chinese threat operation which has infected over 250 million computers worldwide. The installed malware, named Fireball, takes …

IoT
Ready or not, IoT third party risks are here

A new survey conducted by The Ponemon Institute uncovered a high rate of concern among organizations about the security of IoT, yet a gap in understanding of how to mitigate …

struggle
Rising volume of attacks overpowers security teams

New research from IDC that shows organizations are constantly under attack and struggling to keep up. The research finds most organizations run time-consuming security …

Don't miss

Cybersecurity news