Please turn on your JavaScript for this page to function normally.
numbers
Most companies falsely believe their Active Directory is secure

A majority of companies falsely believe their Active Directory (AD) is secure, according to a new survey conducted jointly by Skyport Systems and Redmond Magazine. The …

data
Cybersecurity analytics and operations: Need for automation and orchestration

New research from Enterprise Strategy Group (ESG) shows that when it comes to the evolution of Cybersecurity Analytics and Operations, 71% of respondent organizations find it …

road sign
Is remote access technology leaving you vulnerable?

Insider and third-party access are growing security threats facing organizations and enterprise IT systems, according to Bomgar. Proliferation of security issues Despite …

brain
In 5 years AI may replace pros in tasks within medicine, law and IT

CIOs have a major role to play in preparing businesses for the impact that artificial intelligence (AI) will have on business strategy and human employment. Gartner predicts …

Vera
SAP co-founder’s VC firm leads $15M investment in Vera

Vera announced a $15 million strategic investment led by HP-Ventures, the venture capital firm founded by of SAP Chairman, Hasso Plattner. Drawing from its third fund of €150 …

Magento
Defeating Magento security mechanisms: Attacks used in the real world

DefenseCode recently discovered and reported multiple stored cross-site scripting and cross-site request forgery vulnerabilities in Magento 1 and 2 which will be addressed in …

technology
SOCs are maturing, but need more automation

Security operations centers (SOCs) are growing up, according to a new SANS survey. Respondents indicate the SOC’s primary strengths are flexibility of response and …

lights
Viral phishing scams and vulnerabilities: What to watch out for this Patch Tuesday

I am about to head to Las Vegas for Ivanti’s Interchange 2017 at The Mirage hotel and feeling a bit in a gambling mood, so I am going to take a shot at this month’s forecast …

alert
SharePoint houses sensitive data, but organizations are not keeping it safe

A new report from The Ponemon Institute is focused on how organizations are keeping sensitive or confidential data safe in collaboration and file sharing environments such as …

abstract
Rudimentary attacks pose the greatest risk to midsized organizations

Rudimentary attacks, such as intrusion attempts, information gathering, and policy violations pose the greatest risk to midsized organizations, according to eSentire. Attacks …

Week in review: Hacking industrial robots, criminals exploit SS7 flaws to empty bank accounts

Here’s an overview of some of last week’s most interesting news and articles: Three cybersecurity threat trends that organizations should address today The …

healthcare
Healthcare breaches: Is your data at rest or at risk?

In 2016 healthcare breaches hit an all-time high (328), surpassing the previous record set in 2015 (268), according to Bitglass. Number of breaches Records of approximately …

Don't miss

Cybersecurity news