Please turn on your JavaScript for this page to function normally.
Europe
GDPR challenges all organizations to mask EU data by default

Organizations need to re-architect operations and adopt a secure, data-first approach ahead of the introduction of the European General Data Protection Regulation (GDPR). The …

docker
Docker Security Scanning: Generate a security profile for Docker images

Docker announced Docker Security Scanning, an opt-in service for Docker Cloud private repo plans that provides a security assessment of the software included in container …

password
Let’s stop talking password flaws and instead discuss access management

A good bit of attention has been given to a new report that suggests that there are organizations that don’t change their administrative passwords at all, ever. While it may …

application
Evaluating the security of the top enterprise apps

Wandera announced the findings of a comprehensive security assessment of the most popular business apps used on corporate mobile devices by enterprise customers across North …

DDoS Response Playbook
Playbook: Prepare your business for DDoS attacks

Like any business initiative, good preparation and planning can go a long way toward making the DDoS response process as manageable, painless, and inexpensive as possible. …

money
Application security market will grow to $6.77 billion by 2021

According to a new market research report by MarketsandMarkets, the global application security market size is estimated to grow from USD 2.24 Billion in 2016 to USD 6.77 …

justice sentence gavel law court
Liberty Reserve founder sentenced to 20 years for money laundering

Arthur Budovsky was sentenced in the Southern District of New York to 20 years imprisonment for running a massive money laundering enterprise through his company Liberty …

skull
New ransomware modifications increase 14%

Kaspersky Lab detected 2,896 new ransomware modifications during the first quarter, which is an increase of 14 percent on the previous quarter. In addition, the number of …

risk
How small businesses approach risk mitigation and response

CSID released the findings of a survey recently conducted for small businesses (under 10 employees) to determine sentiment and concerns from small business owners around cyber …

Week in review: ImageMagick 0day, and why you need a Security Evangelist

Here’s an overview of some of last week’s most interesting news, reviews and articles: Web servers and sites under attack via ImageMagick zero-day flaw The flaw …

professional
Companies are hungry for professional open source talent

Recruiting open source talent is a top priority for hiring managers focused on recruiting technology talent, and recruiters are increasingly looking for more professional …

virtual reality
IoT and virtual reality: What’s next?

Smart doorbells, clever fridges, talking TVs, intelligent manufacturing, self-driving cars – all pretty cool. The IoT, in fact, is chock full of potentially very cool …

Don't miss

Cybersecurity news